Cisco Blogs

Search Results

353 posts found

Success for Cisco at Yokogawa Users Conference

…t topic among customers during the event? “Two major topics were clearly in the lead: Industrial Control Systems Cyber Security and accelerated growth of Industrial Wireless in O&G” What kind of solutions is Cisco and Yokogawa working together? “ Cisco and Yokogawa are working on the number of initiatives to address emerging trends and joint customer requirements. One major initiative that we launched and showcased at the event is Secure Ops,…

Read More >>

Tags: , , , , , ,

Why a Next-Generation Firewall Must Be Threat-Centric

…ther to protect against threats coming from multiple vectors. Other NGFWs have not offered best-in-class network security capabilities in their devices, but rather, rudimentary versions of them. In addition, these solutions are poorly integrated and cannot share intelligence between security layers, making advanced threat detection and remediation difficult, if not impossible. Threat-Centric = Integrated Threat Defense Across the Attack Continuum…

Read More >>

Tags: , , , , , ,

Dynamic Cyber Attacks Call for Dynamic Controls

…ed to defend need to mature as well; and Finally, there’s too much complexity, fragmentation, and cost in legacy security deployments. A recent malicious advertising attack called “Kyle and Stan”, discovered by our Talos Security Intelligence and Research Group, demonstrates the challenges defenders are up against — read their full post here. Posing as legitimate advertisers, cybercriminals contact the major advertisement networks to try to get…

Read More >>

Tags: , , , , , , , ,

Prepare for Data Breaches! They Will Happen … to Anyone

…eliminate these risks, but we can control and minimize them.Cisco Enterprise Network solutions provide built-in security such as Cyber Threat Defense and Policy Defined Network Segmentation to help defend against data breaches. The best part is, you already have most of these capabilities when you deploy Cisco routing, switching and wireless networks. You’ll just need to plan ahead and turn them on. On Sept 18, 2014 we hosted a live webcast on C…

Read More >>

Tags: , , ,

Addressing Cyber-Security Challenges of Today and Tomorrow

Did you know that Cisco detects over 1.5 million intrusion attempts on Cisco’s network every day? With more than 13 billion NetFlow records captured daily, over 22 Terabytes of traffic inspected, and 750 Gigabyte of system logs collected on a daily basis, it’s changing the landscape for how to secure intellectual property, confidential information, and mitigate malicious attacks. This brief video shares relevant security information, real-…

Read More >>

Tags: , , , , ,