Security

May 23, 2017

SECURITY

AMPlify your Security

See how our customers are enhancing their security posture with AMP for Endpoints At Cisco we know that security teams are a critical piece of what’s possible in any organization and simplifying their job is of utmost importance to us. We believe that by allowing customers to see more, protect bette…

May 23, 2017

SECURITY

Cisco IoT Threat Defense: Securing the IoT at Scale

Protect Vital Services in Advanced Medical Care, Automated Manufacturing, and Power Generation and Delivery From time to time, I find it’s helpful to pause and take stock of why I do what I do. Recently, I found myself talking with a CEO of a medical startup. Their goal was to improve the care of ca…

May 18, 2017

SECURITY

The Network’s Role in Securing the IoT

Over the past few weeks, I’ve blogged about the importance of having a holistic security strategy for the Internet of Things (IoT). Now is the time to really amp up security and privacy by design at the endpoint device level. Everyone has a role to play. We know that enterprises are struggling to se…

May 15, 2017

SECURITY

Cisco AMP for Endpoints Meets PCI and HIPAA Requirements for Compliance

Cisco AMP for Endpoints was recently the subject of a thorough technical review and test to validate that the solution satisfies requirements in accordance with the Payment Card Industry Data Security Standard (PCI DSS) version 3.2 and the Health Insurance Portability and Accountability Act (HIPAA)…

May 10, 2017

SECURITY

Triage Forensics: Leveraging Digital Forensics during Incident Response

You have just been notified by a “TLA” (Three Letter Agency), a law enforcement agency, that your organization has suffered a data breach. Depending on your Threat Management Maturity level, you will either approach this methodically or ad-hoc. A TLA notification will generally involve leveraging th…

May 8, 2017

SECURITY

Secure the Branch by Securing the Business

Security in not simple and not all companies are the same. Different business needs, inter-connected applications, and compliance regulations are coupled with increasing demands of the network by employees, partners, customers and most recently, devices; the fragmentation of the attack surface is ma…

April 28, 2017

SECURITY

Respecting Customer Privacy is Not an Option

There was recent news of a multi-billion dollar start-up that utilized an actual customer’s network environment for sales demonstrations.  To make matters worse, the practice went on for years, without the customer’s (which happened to be a medical facility) permission or knowledge (which had the po…

April 21, 2017

SECURITY

Secure Access Done Right: Cisco ISE Wins the SC Magazine 2017 Award for Best NAC Solution

At the most recent RSA Conference, SC Magazine awarded Cisco Identity Services Engine (ISE) the top spot for Best NAC Solution. In the words of the award panel, “this honor goes to vendors and practitioners who make a difference… and detect, respond and recover from cyber attacks.”[1] Network Access…

April 19, 2017

SECURITY

How to Choose a Next-Generation Endpoint Security Solution

When organizations begin their search for an advanced, next-generation endpoint security solution to protect PCs, Macs, servers, and mobile devices, they have a lot of different vendors to choose from and a lot of questions. Can it prevent attacks? What kind of malware can it protect against? What i…

Why Cisco Security?

Explore our Products & Services

Subscribe to our Blogs

Stay up to date and get the latest blogs from Cisco Security