Firepower Management Center

March 7, 2019

SECURITY

Announcing Duo’s MFA for Cisco’s Firepower Threat Defense (FTD)

This blog post is the second in a three-part series on how Duo’s MFA integrates with Cisco technology. Read part one here. More than 5,000 customers use Duo’s multi-factor authentication (MFA) with Cisco’s AnyConnect to provide secure VPN access to users – the integration with Cisco’s AnyConnect VPN…

August 26, 2018

SECURITY

Protecting SugarCreek’s 24/7 Food Manufacturing Across Four States

SugarCreek Brandworthy food solutions is a growing, mid-western food manufacturer helping some of the industry’s largest and best-known companies develop innovative food solutions. SugarCreek’s authentic culinary expertise helps drive innovation. Their in-house expertise, in everything from food tre…

August 24, 2018

SECURITY

Secure Multi-Tenancy Part 2: Going Multi-Instance

Requirements Overview In the previous blog post, we went over the common requirements for partitioning a single physical security appliance into multiple virtual firewalls. We talked about how this logical separation brings a lot of complexity into environments where true data and management plane i…

August 14, 2018

SECURITY

Security Automation: Putting the odds ever in your favor

Co-authored by Emily Skahill “May the odds be ever in your favor…” It was the irony of this pithy statement that sent the Hunger Games heroine, Katniss Everdeen, to an almost certain death. A dramatic reminder that we should never take “the odds” for granted. Against the backdrop of attacks like Wa…

June 1, 2018

SECURITY

Cisco and Downer Partnership Delivers First Smart Cities Project

Cisco and Downer have an ongoing strategic Internet of Things (IoT) partnership that was recently expanded to include Smart Cities. Downer, a diversified engineering and services company headquartered in Australia, in August of 2017, secured a contract to build out and, with the system owner, co-man…

January 16, 2018

DEVELOPER

Automate Threat Intelligence Using Cisco Threat Intelligence Director

Blog co-authored by Pramod Chandrashekar. Over the past year, cyber attacks have become increasingly common and sophisticated, they were carried out by not only individuals, hacker groups but also nation actors that are well equipped and financed. The sheer scope and audaciousness of these attacks a…

February 13, 2017

SECURITY

Staying Ahead of the Hack: Operationalizing Threat Intelligence to Strengthen Defenses

Many pieces of forensic evidence come into play when investigating a crime scene – analysis of fingerprints, DNA, shoe prints, videos/photos, ballistics, etc. By analyzing the data, a picture of the crime emerges, which in the case of a serial killer often includes his or her MO or method of operati…

December 19, 2016

SECURITY

To be Effective, Security Needs to Be a Force Multiplier

Effective security is simple, open, and automated.  We’ve already talked about simple and open. Now let’s talk about automated. Security admins can relate to this scenario. You just learned of an infected system in your environment of thousands of devices. How many others are affected? That’s hard t…