Firepower Management Center

April 14, 2020

SECURITY

The Firewall: The foundation for a robust Security Platform

4 min read

Does a single view, a single point of multivendor integration, or a single place to conduct workflows and track metrics exist? What if, we said yes...

March 7, 2019

SECURITY

Announcing Duo’s MFA for Cisco’s Firepower Threat Defense (FTD)

1 min read

We recently extended our ability to secure Cisco offerings with the beta availability of Duo's MFA for AnyConnect running on Cisco’s FirePower Threat Defense (FTD). You can learn more about Cisco FTD here. Previously, you were only able to secure your AnyConnect VPN client running on Adaptive Security Appliance (ASA) products.

August 26, 2018

SECURITY

Protecting SugarCreek’s 24/7 Food Manufacturing Across Four States

1 min read

SugarCreek Brandworthy food solutions is a growing, mid-western food manufacturer helping some of the industry’s largest and best-known companies develop innovative food solutions.

August 24, 2018

SECURITY

Secure Multi-Tenancy Part 2: Going Multi-Instance

5 min read

The Firepower multi-instance capability represents a unique and novel approach to deploying secure multi-tenancy.

August 14, 2018

SECURITY

Security Automation: Putting the odds ever in your favor

5 min read

“May the odds be ever in your favor…” It was the irony of this pithy statement that sent the Hunger Games heroine, Katniss Everdeen, to an almost certain death....

June 1, 2018

SECURITY

Cisco and Downer Partnership Delivers First Smart Cities Project

1 min read

Cisco and Downer have an ongoing strategic Internet of Things (IoT) partnership that was recently expanded to include Smart Cities. Downer, a diversified engineering and services company headquartered in...

January 16, 2018

DEVELOPER

Automate Threat Intelligence Using Cisco Threat Intelligence Director

3 min read

Join blog co-author, Pramod Chandrashekar, at CLEUR for his session "Introduction to Cisco Threat Intelligence Director APIs." [DEVNET-1774]

February 13, 2017

SECURITY

Staying Ahead of the Hack: Operationalizing Threat Intelligence to Strengthen Defenses

3 min read

Many pieces of forensic evidence come into play when investigating a crime scene – analysis of fingerprints, DNA, shoe prints, videos/photos, ballistics, etc. By analyzing the data, a picture of...

December 19, 2016

SECURITY

To be Effective, Security Needs to Be a Force Multiplier

4 min read

Effective security is simple, open, and automated.  We’ve already talked about simple and open. Now let’s talk about automated. Security admins can relate to this scenario. You just learned of an infected system in your environment of thousands of devices. How many others are affected? That’s hard to figure out even in elite operations. What […]