Security

June 12, 2019

SECURITY

Staying Ahead of ‘Andromeda-Style’ Threats in Your Environment

Why rapid attack containment and a short remediation cycle matter When a new threat gets in the environment, a security incident could unfold very quickly. Detecting the compromise and taking control of the infected endpoint fast is not only critical to preventing the spread of the threat, it is als…

June 11, 2019

SECURITY

Your applications are on the move – how do you secure them everywhere?

The applications we need to do business are no longer just residing in a single, physical data center. Sure, there are some applications running in your on-premises data center. But some are also running in offsite data centers. Or in your private cloud. Or on Amazon Web Services. Many are likely mo…

June 11, 2019

SECURITY

Branch Security for the Digital Age

The market consideration and adoption of software-defined WAN represents the largest WAN transformation in recent history. Organizations are turning to SD-WAN to improve connectivity, reduce costs, and simplify management at their branch locations. In fact, a recent research study from the Enterpris…

June 10, 2019

SECURITY

3 things you need to know about Cisco Threat Response at CLUS

Overwhelmed by the sheer volume of security alerts and potential threats hitting your SOC? Security risks have never been greater, with networks expanding into the cloud, the explosion of mobile and IoT devices, and increasingly sophisticated threats. On top of that, disparate security tools make it…

June 10, 2019

SECURITY

Cisco Encrypted Traffic Analytics: Necessity Driving Ubiquity

In June 2017, Cisco announced the Encrypted Traffic Analytics (ETA) solution – a breakthrough technology stack that allows us to gain insight into encrypted traffic without decryption. That insight provides an unprecedented view into the use of encryption across your entire network and allows us to…

June 7, 2019

SECURITY

The Endless Scourge of Malicious Email

There is no question that unwanted email is a source of annoyance. It is also the biggest source of cyber threats. In fact, just last month, spam accounted for 85 percent of all email sent. Plus, according to Verizon’s 2018 Data Breach Investigations Report, email is the number one vector for both m…

June 7, 2019

SECURITY

Security Happenings at Cisco Live U.S.

Come learn from the best in threat defense Throughout the year, you hear us talking about our innovative security strategy – about how integration, automation, and simplification make your security posture better. We highlight the need for a new approach to security in a multi-domain world. An appr…

June 6, 2019

SECURITY

Security Analytics and Logging: Supercharging FirePower with Stealthwatch

When we consider network threat detection, most of us immediately think of signature and rule-based intrusion detection and prevention systems (IDPSs). However, it is a little discussed fact that the very first intrusion detection systems, built back in the ‘80s, were actually based on anomaly detec…

June 6, 2019

SECURITY

A Bridge to the Future of the Firewall

Cisco Defense Orchestrator adds support for new platforms, cloud logging and advanced analytics Organizations today are faced with securing their business everywhere across their hybrid networks – from the campus network, to remote sites, to public clouds and remote employees. This explosion o…

Why Cisco Security?

Explore our Products & Services

Subscribe to our Blogs

Stay up to date and get the latest blogs from Cisco Security