Security
Stealthwatch Cloud: Securing the public cloud, without undercutting it
Public cloud infrastructure requires a new approach to security. We’ve all heard that line, but what does it actually mean? There is little stopping you from, say, deploying agents in the cloud to monitor traffic and detect threats and bringing other on-premises techniques to bear. But as anyone who…
Extend Your Security to the Cloud with Confidence
Introducing the Cisco Cloud Security Assessment Service On a recent trip with my kids, one of them remarked how differently the clouds looked from the plane and how passing through them you couldn’t see theoutline that seems so clear when viewing clouds from the ground. I explained to her that when…
Cisco Expands Its Multicloud Security Portfolio
The traditional corporate data center is still the hub for most enterprises, but increasingly organizations are leveraging the benefits of the multicloud world to drive operational efficiencies, scale and expand growth. While the benefits are clear, securing multicloud environments like SaaS apps, p…
Security as a Strategic Imperative
In the digital era, every company is considered a technology company. Whether you provide electricity, banking or public transportation, you are increasingly dependent upon the internet and network connectively. If all companies are technology companies, that means all companies need to prioritize c…
Filling the Cybersecurity Professionals Gap – with Women
Due to the high-profile data breaches, cybersecurity has become a household word. Think back to just one month ago, when the data breach at Equifax exposed the personal information for 145.5 million consumers – almost half of all Americans. At Cisco, we know our customers and other business leaders…
Data Center Application Layer Attacks
There have been a number of articles written on data center outages and their business costs of lost productivity, infrastructure damage, loss of brand reputation and goodwill in the marketplace, and litigation costs. Data center outages can occur from a number of factors such as such as component…
Gartner releases report on the transformation of the SWG market
On September 12, Gartner – the leading research and advisory company – released a competitive report on the secure web gateway (SWG) market. The report highlights the significant transformation as the traditional SWG gives way to a new platform –– the secure internet gateway (SIG). Gartner states, “…
How to Quickly Differentiate Between Malicious and Harmless Traffic Using the Cisco Security Packet Analyzer
With the constant news headlines about data theft it is mandatory that organizations understand what data is entering, traversing, and leaving their networks and have the ability to examine that data if necessary for conducting network forensic investigations. Two popular style of attacks that are…
Fireproofing your network with software-defined segmentation
We often hear of the many challenges of the industrial revolution, but one of the scourges of this time period that often goes unmentioned was mass fires. To the people of the time, great fires threatened the very viability of industrialization. The number of fires bearing the moniker ‘great’ helps…

Why Cisco Security?
Explore our Products & Services

Subscribe to our Blogs
Stay up to date and get the latest blogs from Cisco Security
1