threat defense
Cisco Recognized as a Leader in 2019 Gartner Magic Quadrant for Network Firewalls
I am pleased to announce that Gartner has named Cisco a Leader in the 2019 Magic Quadrant for Network Firewalls. We believe, this recognition from Gartner is an important tool you can use, as a Cisco partner, when positioning Cisco Next-Generation Firewalls (NGFWs) to your customers. It validates o…
Attivo Networks ThreatDirect™ Deception in a Docker Container
Scaling with the Cisco Catalyst 9000 Family of Switches This blog is authored by Joseph Salazar, Technical Marketing Engineer at Attivo Networks Networks are constantly evolving to meet the demands of ever-expanding digital business infrastructure. Organizational networks can now include remote offi…
Simplifying Security for Cisco Customers with New Cisco ONE Advanced Security Suites
Security is the single biggest concern for our customers. And today, the average organization has security products from dozens of vendors, making security infrastructure complex and difficult to manage. With the introduction of Cisco ONE Advanced Security, Cisco is reducing this complexity, and sim…
The Value of Collaboration in Weakening Attackers
Today’s attackers deploy complex and clever threats that are difficult to combat with just one method of defense. In some cases, defenders must go beyond tools for detecting attacks and devise a different approach for obstructing our adversaries’ ability to operate. As detailed in the Cisco 2016 Ann…
Branch Direct Internet Access: is your branch office secure?
With the recent launch of FirePower Threat Defense on Cisco 4000 Series Integrated Services Routers, I would like to spend some time talking about enterprise branch security and what are the requirements to keep in mind to secure your branch office. Let’s start out by examining your branch environme…
The Need To Solve for Time
Ponemon Institute called 2014 the year of the “Mega Breaches,” which will be remembered for its series of mega security breaches and attacks. These “Mega Breaches” are perfect examples of what is commonly known as Advanced Persistent Threats (APTs). The Ponemon Institute survey asked, among many que…
“Security Everywhere” – Enterprise Branch Security for Direct Internet Access
Two weeks ago, a leading global medical device manufacturer came to Cisco for advice. In an effort to streamline IT operations and reduce operating costs, the customer had recently migrated from their internal Microsoft Exchange 2010 environment to Office365, Microsoft’s hosted online service. The m…
Cisco Live 2013 Orlando: Security Training and Breakout Sessions
Cisco Live Orlando, June 23-27, 2013, is quickly approaching and registration is open. The Security track this year includes 72 breakout sessions, 74 hours of labs and seminars, and 3 Product Solution Overview sessions, accounting for about 15 percent of all the content delivered at Cisco Live. New…
Defense in Depth with Software Defined Networking
Last week at the RSA Conference in San Francisco, I had the pleasure of speaking to thousands of security professionals about the opportunities and risks associated with using Software Defined Networking (SDN) for security, which will be the underlying fabric of our next generation data centers and…