Security
Are You Using Yesterday’s Tools to Stop Today’s Threats?
Take a look around you. What’s the average age of the technology you see? Your cell phone is probably 2 years old at most. Your laptop may be slightly older. Now, take a look at the technology you’re using to protect these devices. If you find yourself looking at a primarily signature focused legacy…
Better design for simpler, more effective security
Few will contest the notion that security is complex. Evolving threats. Clever, motivated attackers. And all too often, vendor-inflicted complexity of managing security from the mismatched consoles from dozens of vendors. In this case, not only must users jump between consoles but the actions tha…
2018 Forrester TEI Study Reveals Stealthwatch + ISE provide 120% ROI
With digital transformation unlocking unprecedented value for today’s businesses and consumers, the key to success is arguably predicated on speed: Whoever is the fastest to enter new markets; the fastest to innovate; the fastest to deliver value to consumers can be the difference that separates the…
Cisco and IBM: Partnering for Better Security
Considering the spate of cyber threats faced by customers, the need to more easily prioritize these threats, understand the scope and veracity of the attacks, and subsequently automate the responses, has never been more critical. While many security vendors exist to address some challenges, no singl…
Securing the IIoT: Your Opportunity to be a Cyber Hero
There’s tremendous potential for operational technology (OT) and information technology (IT) professionals right now, to be cyber heroes in any organization tackling security for the Industrial Internet of Things (IIoT). That’s my takeaway from the IoT Evolution Expo, where I spoke last week on a pa…
Demystifying the API (Using Threat Grid as an Example)
Let’s talk about API usage. An API is a means of interacting with a program via another program. Just like a UI is a User Interface, an API is an Application Program Interface. Cisco is committed to providing practical, robust, scalable APIs across the Advanced Threat Solutions product space,…
Securing Encrypted Traffic on a Global Scale
written by Martin Rehak and Blake Anderson, on behalf of Cognitive and ETA teams Introduction How many engineers does it take to find malware in encrypted traffic? In case of Cisco, the core of machine learning team that enables Encrypted Traffic Analysis (ETA) is about 50 engineers, security resear…
Cisco named a Visionary for AMP for Endpoints in Gartner’s 2018 Magic Quadrant for Endpoint Protection Platforms
Gartner has named Cisco a Visionary for AMP for Endpoints in the January 2018 Magic Quadrant for Endpoint Protection Platforms (EPP). Cisco is proud to be included in this auspicious report and honored to receive recognition from one of the most influential industry evaluations of endpoint security…
Are Customer Data Privacy Concerns Slowing Down Business?
Today’s savvy customers are paying more attention to the data privacy features of the products and services they buy. They want to know what data is captured, how it is used, where it is stored, how it is transferred, who has access to it, and when it is deleted. They’re also concerned about the ris…

Why Cisco Security?
Explore our Products & Services

Subscribe to our Blogs
Stay up to date and get the latest blogs from Cisco Security