Avatar

John Dominguez

Product Marketing

Cisco Security Business Group

John Dominguez is a product marketer in the Security Business Group at Cisco. With over 7 years experience in the networking and security industry, John is currently focused on the next-generation firewall marketplace. In his role, John is responsible for messaging and positioning, marketing strategy, content creation, sales and partner enablement, and product evangelism for the Cisco Next-Generation Firewall.

In his previous role, he marketed Cisco’s Advanced Malware Protection product suite, including AMP for Endpoints, AMP for Networks, and Cisco’s “AMP Everywhere” campaign. Before that, John has worn many hats, including a stint in routing and switching product marketing, small business ownership, and general management for an industrial supply company.

John has an MBA in Marketing and Strategy from the University of Michigan, and a BA in Economics and Government from Dartmouth College.

John lives in San Francisco, California.

Articles

July 1, 2019

SECURITY

Get a Security System, not a Security Smorgasbord

If you’re still juggling a lot of cyber security tools, you’re not alone. Even as businesses make headway on trimming point-solutions, the recently released Cisco CISO Benchmark Report found that 14% of security leaders are managing more than 20 vendors. And 3% are dealing with over 50. It’s easy fo…

June 18, 2019

SECURITY

7 Questions about the Firewall: A Chat with Cisco featuring Gartner

The firewall remains the front line of cyber-defense for most organizations. The firewall protects an organization’s network, and that function isn’t going away anytime soon. Remember when people used to say, “the firewall is dead”? The numbers tell a different story. Gartner forecasts that this mar…

April 16, 2019

SECURITY

Kill Complexity with Cisco Defense Orchestrator

It’s often said that “complexity is the enemy of security.” It’s true, in so many ways. If a security product is too complex to manage, it will slow down your investigations which slows down your ability to detect and stop threats. Naturally, you’ll gravitate to an easier-to-use product. If your sec…

March 12, 2019

SECURITY

Can your firewall do that?

Part 3: Save time and reduce complexity with better management, automated operations, and product integration Networking and security teams are up against a lot. Hunting for cyberthreats is difficult. Policy management and enforcement across multiple devices is time-consuming and error-prone. Most t…

March 5, 2019

SECURITY

Cisco Firewall Named a 2018 Global Market Leader by Frost and Sullivan

Frost & Sullivan has awarded Cisco the 2018 Market Leadership Award in the Global Network Firewall Market. Frost & Sullivan defines firewall market leaders as “those that recognize the varied needs of the market and evolve their firewall platforms to meet those needs – now and into the…

February 26, 2019

SECURITY

Can your firewall do that?

Part 2: Visibility to detect and stop threats fast In my last post, we explored how a firewall should be using top-notch threat intelligence, sound security policy, and features like intrusion prevention to pre-emptively stop threats before they can embed themselves in your network. These preventive…

February 13, 2019

SECURITY

Can your firewall do that?

Part 1: Prevent breaches automatically to keep your business moving At Cisco, we’re constantly talking with executives and IT leaders about cybersecurity. They’re concerned – they want to know how to protect their company, their employees, and their customers. But three primary concerns always seem…

September 20, 2018

SECURITY

3 Reasons to Upgrade from Cisco ASA to Cisco Firepower NGFW Today

You have a Cisco ASA stateful firewall[i]. You like it. It’s reliable. You think, “It works… if it ain’t broke, don’t fix it.” But you’ve had your ASA for years now, and during that time, threats have evolved. Malware is more sophisticated than ever. What’s more, your business has grown, the demands…

January 3, 2018

SECURITY

Introducing Exploit Prevention to Stop File-Less Attacks

In war, any good military strategist will try to exploit their enemy’s weaknesses. Cybercriminals are no different. They try to gain access to your endpoints and your sensitive data by exploiting weaknesses in your system, like a vulnerability in your software or in your operating system processes.…