Security
Staying Ahead of ‘Andromeda-Style’ Threats in Your Environment
Why rapid attack containment and a short remediation cycle matter When a new threat gets in the environment, a security incident could unfold very quickly. Detecting the compromise and taking control of the infected endpoint fast is not only critical to preventing the spread of the threat, it is als…
Your applications are on the move – how do you secure them everywhere?
The applications we need to do business are no longer just residing in a single, physical data center. Sure, there are some applications running in your on-premises data center. But some are also running in offsite data centers. Or in your private cloud. Or on Amazon Web Services. Many are likely mo…
Branch Security for the Digital Age
The market consideration and adoption of software-defined WAN represents the largest WAN transformation in recent history. Organizations are turning to SD-WAN to improve connectivity, reduce costs, and simplify management at their branch locations. In fact, a recent research study from the Enterpris…
3 things you need to know about Cisco Threat Response at CLUS
Overwhelmed by the sheer volume of security alerts and potential threats hitting your SOC? Security risks have never been greater, with networks expanding into the cloud, the explosion of mobile and IoT devices, and increasingly sophisticated threats. On top of that, disparate security tools make it…
Cisco Encrypted Traffic Analytics: Necessity Driving Ubiquity
In June 2017, Cisco announced the Encrypted Traffic Analytics (ETA) solution – a breakthrough technology stack that allows us to gain insight into encrypted traffic without decryption. That insight provides an unprecedented view into the use of encryption across your entire network and allows us to…
The Endless Scourge of Malicious Email
There is no question that unwanted email is a source of annoyance. It is also the biggest source of cyber threats. In fact, just last month, spam accounted for 85 percent of all email sent. Plus, according to Verizon’s 2018 Data Breach Investigations Report, email is the number one vector for both m…
Security Happenings at Cisco Live U.S.
Come learn from the best in threat defense Throughout the year, you hear us talking about our innovative security strategy – about how integration, automation, and simplification make your security posture better. We highlight the need for a new approach to security in a multi-domain world. An appr…
Security Analytics and Logging: Supercharging FirePower with Stealthwatch
When we consider network threat detection, most of us immediately think of signature and rule-based intrusion detection and prevention systems (IDPSs). However, it is a little discussed fact that the very first intrusion detection systems, built back in the ‘80s, were actually based on anomaly detec…
A Bridge to the Future of the Firewall
Cisco Defense Orchestrator adds support for new platforms, cloud logging and advanced analytics Organizations today are faced with securing their business everywhere across their hybrid networks – from the campus network, to remote sites, to public clouds and remote employees. This explosion o…

Why Cisco Security?
Explore our Products & Services

Subscribe to our Blogs
Stay up to date and get the latest blogs from Cisco Security