AMP for Endpoints

February 27, 2020

SECURITY

‘Never Trust, Always Verify’: Duo joins forces with AMP for Endpoint

29.3 billion – that’s the approximate number of devices and network connections estimated globally by 2023, according to the latest Cisco Annual Internet Report. As we get more connected, we can expect to see a massive rise in cybersecurity threats – a trend that is predicted to double from 9 millio…

December 18, 2019

PARTNER

The Gift that Keeps on Giving All Year Round

The holiday season is upon us! It’s that time of the year for trying to painstakingly think of the perfect gift. Don’t get stuck gifting your customers with the proverbial firewall “fruit cake”. Here’s an idea: Gift your customers a modern firewall that will lay the foundation for a secure network.…

December 17, 2019

SECURITY

Cisco and IBM: Solving Customer Challenges through the Power of Partnerships

Complexity is one of the top challenges our customers face today. CISOs not only want to enable their teams to detect and respond to threats faster, they want to simplify workflows and streamline operations at the same time. In our annual CISO surveys, we’ve been seeing a trend toward vendor consoli…

November 12, 2019

SECURITY

Finding the malicious needles in your endpoint haystacks

Accelerate Threat Hunts and Investigations with Pre-Curated Complex Queries Security teams often lack the ability to gain deep visibility into the state of all their endpoints in real time. Even with a bevy of tools at their fingertips, once an incident occurs, conducting investigations can be liken…

November 5, 2019

SECURITY

Securing Your Future by Innovating Today

At a time when cybercrime costs three times more than natural disasters globally1, the demands on security are constantly growing. Whether you’re asked to protect a workforce that roams anywhere, a workplace that is digitized, or workloads that run wherever, your disparate security solutions are cre…

September 30, 2019

SECURITY

Threats in encrypted traffic

There was a time when the web was open. Quite literally—communications taking place on the early web were not masked in any significant fashion. This meant that it was fairly trivial for a bad actor to intercept and read the data being transmitted between networked devices. This was especially troub…

September 24, 2019

SECURITY

The Circus is Coming to Town and Why You Should Stay Away

We are entering the integrated era You’ve probably noticed the recent headlines of a few one-trick ponies getting together to form their own three ring circus.  These events underscore a paradigm shift that is underway – the security world is entering the integrated era.  Nowadays, customers want co…

August 16, 2019

SECURITY

Three Reasons to Upgrade Your Legacy AV/Endpoint Security

What technology do you remember the most from the ‘80s – ‘90s? Portable CD players? Floppy disks? 2G flip phones? None of these, of course, survived the digital evolution. Do you know which technology developed in that era that did survive? Legacy antivirus (AV). That’s right. While many other techn…

July 1, 2019

SECURITY

Get a Security System, not a Security Smorgasbord

If you’re still juggling a lot of cyber security tools, you’re not alone. Even as businesses make headway on trimming point-solutions, the recently released Cisco CISO Benchmark Report found that 14% of security leaders are managing more than 20 vendors. And 3% are dealing with over 50. It’s easy fo…