Firepower Management Center
Announcing Duo’s MFA for Cisco’s Firepower Threat Defense (FTD)
This blog post is the second in a three-part series on how Duo’s MFA integrates with Cisco technology. Read part one here. More than 5,000 customers use Duo’s multi-factor authentication (MFA) with Cisco’s AnyConnect to provide secure VPN access to users – the integration with Cisco’s AnyConnect VPN…
Protecting SugarCreek’s 24/7 Food Manufacturing Across Four States
SugarCreek Brandworthy food solutions is a growing, mid-western food manufacturer helping some of the industry’s largest and best-known companies develop innovative food solutions. SugarCreek’s authentic culinary expertise helps drive innovation. Their in-house expertise, in everything from food tre…
Secure Multi-Tenancy Part 2: Going Multi-Instance
Requirements Overview In the previous blog post, we went over the common requirements for partitioning a single physical security appliance into multiple virtual firewalls. We talked about how this logical separation brings a lot of complexity into environments where true data and management plane i…
Security Automation: Putting the odds ever in your favor
Co-authored by Emily Skahill “May the odds be ever in your favor…” It was the irony of this pithy statement that sent the Hunger Games heroine, Katniss Everdeen, to an almost certain death. A dramatic reminder that we should never take “the odds” for granted. Against the backdrop of attacks like Wa…
Cisco and Downer Partnership Delivers First Smart Cities Project
Cisco and Downer have an ongoing strategic Internet of Things (IoT) partnership that was recently expanded to include Smart Cities. Downer, a diversified engineering and services company headquartered in Australia, in August of 2017, secured a contract to build out and, with the system owner, co-man…
Automate Threat Intelligence Using Cisco Threat Intelligence Director
Blog co-authored by Pramod Chandrashekar. Over the past year, cyber attacks have become increasingly common and sophisticated, they were carried out by not only individuals, hacker groups but also nation actors that are well equipped and financed. The sheer scope and audaciousness of these attacks a…
Staying Ahead of the Hack: Operationalizing Threat Intelligence to Strengthen Defenses
Many pieces of forensic evidence come into play when investigating a crime scene – analysis of fingerprints, DNA, shoe prints, videos/photos, ballistics, etc. By analyzing the data, a picture of the crime emerges, which in the case of a serial killer often includes his or her MO or method of operati…
To be Effective, Security Needs to Be a Force Multiplier
Effective security is simple, open, and automated. We’ve already talked about simple and open. Now let’s talk about automated. Security admins can relate to this scenario. You just learned of an infected system in your environment of thousands of devices. How many others are affected? That’s hard t…
1