Security
Cisco Drives Service Provider Cloud and NFV Growth with EANTC Validated Security Solutions
Massive digital transformation is creating significant new opportunities for service providers. The number of Internet connected devices will grow from 15 billion today to 500 billion by 2030. The rise of cloud computing is a game-changer in service provider architecture and service delivery resulti…
Here, There & Everywhere – Harnessing Your Value Chain Security Beast!
Security threats are varied and often unpredictable. We are faced with an expanding attack surface. Adversaries abound, spanning organized crime, nation-states and malicious insiders. It is against this backdrop that the IT solutions lifecycle may appear to be an “unharnessable” security beast: the…
Firepower NGFW Steps up to Deliver Greater Effectiveness with Reduced Costs and Complexity
Full NGFW integration yields streamlined security and greater value from investments We know that security, when done properly, can be a business enabler. But as IT teams build out their security capabilities, the lack of integrated solutions yields lower threat effectiveness and inevitably leads to…
Protecting Data Globally: A Modern Mandate
Data is the currency of the knowledge economy. This makes it a highly valuable commodity – for organizations and cybercriminals alike. As threats to data security mount, organizations must find ways to keep their critical digital assets safe at all touch points and compliant to international data pr…
Introducing Cisco Firepower 4100 Series Next-Generation Firewall
Enable Digital Business with the Industry’s First Fully Integrated, Threat-Focused NGFW Today’s world is undergoing digital disruption that will spark more connectivity than ever before, as consumers, businesses and governments leverage digitization to drive innovation forward. Yet, the more connect…
Take a Strategic Approach to Security Segmentation
[This post was written by Pavan Reddy, Customer Solutions Director, Cisco Security Services] You’ve read the stats: by the end of the decade, the Internet of Everything will result in 50 billion networked connections of people, process data and things. You don’t need to look far to see it come to li…
DNSChanger Outbreak Linked to Adware Install Base
[Ed. note: This post was authored by Veronica Valeros, Ross Gibb, Eric Hulse, and Martin Rehak] Late last autumn, the detector described in one of our previous posts, Cognitive Research: Learning Detectors of Malicious Network Traffic, started to pick up a handful of infected hosts exhibiting a new…
Built-In Security: Sharing the ‘How’
I work with a lot of customers discussing how they can reduce their cyber risk and increase resiliency with an effective security strategy. It’s easy to talk about leading practices for security, but figuring out how to put them into practice can be a whole other story. As I mentioned in a recent po…
Small to Midsize Business Security Capabilities Falling as Attack Sophistication Rises
Working with limited resources and being asked to “do more with less” is often par for the course for small and midsize businesses (SMBs). Smaller companies are also credited with being more nimble than their enterprise counterparts, adopting next-generation tools more quickly and experimenting with…

Why Cisco Security?
Explore our Products & Services

Subscribe to our Blogs
Stay up to date and get the latest blogs from Cisco Security