Cisco Firepower Threat Defense
Cisco and IBM: Solving Customer Challenges through the Power of Partnerships
Complexity is one of the top challenges our customers face today. CISOs not only want to enable their teams to detect and respond to threats faster, they want to simplify workflows and streamline operations at the same time. In our annual CISO surveys, we’ve been seeing a trend toward vendor consoli…
A Bridge to the Future of the Firewall
Cisco Defense Orchestrator adds support for new platforms, cloud logging and advanced analytics Organizations today are faced with securing their business everywhere across their hybrid networks – from the campus network, to remote sites, to public clouds and remote employees. This explosion o…
To the Depth of TLS Invisibility and Beyond
Encrypted traffic is changing the threat landscape. Today’s digital businesses rely on encryption of application traffic for information sharing. The fact that the Internet is becoming increasingly “dark” is not debated with all indicators showing a steady increase. Compounding this issue is the pot…
Announcing Duo’s MFA for Cisco’s Firepower Threat Defense (FTD)
This blog post is the second in a three-part series on how Duo’s MFA integrates with Cisco technology. Read part one here. More than 5,000 customers use Duo’s multi-factor authentication (MFA) with Cisco’s AnyConnect to provide secure VPN access to users – the integration with Cisco’s AnyConnect VPN…
Secure Multi-Tenancy Part 2: Going Multi-Instance
Requirements Overview In the previous blog post, we went over the common requirements for partitioning a single physical security appliance into multiple virtual firewalls. We talked about how this logical separation brings a lot of complexity into environments where true data and management plane i…
Security Multi-Tenancy Part 1: Defining the Problem
Pre-Virtual Virtual Firewalls Nowadays, everyone likes to talk about network function virtualization. Most security vendors build their firewall products to run on a few popular hypervisors. However, the “virtual firewall” term predates this virtualization craze. Many firewall administrators use thi…
2