Cisco Blogs

Search Results

409 posts found

Cisco Demonstrating Solutions for a variety of utilities needs at DistribuTECH

…ring and control across your network communications by supporting integration with application layer platforms. Security If some of your more pressing needs are around security, you will get a first-hand look at a better way to manage cybersecurity risk in industrial control networks and critical infrastructure networks. The Secure Ops demo will showcase situational awareness and compliance dashboards that make it easier to manage assets and se…

Read More >>

Tags: , , , , , , , ,

Cisco Cloud Security Architecture: Un-Cloaking Invisible Threats

…ing to many of us, to be constantly engaged in the never ending cat and mouse game we play to manage and detect cyber threats. When it comes to securing private and public clouds, a new generation of security architecture is needed to help us protect business assets. Here at Cisco, we have worked with large enterprises, service providers and security experts to develop a threat-focused, next generation security architecture that stops and detects…

Read More >>

Tags: , , , , , , ,

Secure Remote Access During Holidays

…itive financial records continually throughout the holidays but doesn’t want to get bogged down by all sorts of security stuff installed on his system to get his work done. Think about the sales manager that is trying to close business with several customers that need to use their budget before the end of a quarter. Now, what sales manager would say, “Can we wait a few days and give you time to change your mind?” That means they need immediate a…

Read More >>

Tags: , , , ,

DistribuTECH, Cisco, Business and Technical (IT and OT) Solutions. See them all in San Diego February 3rd-4th

…meeting, contact Samantha Bullock. Sandra will help make it happen. We’ll have an exciting set of demonstrations available, showing Field Area Networks, Industrial Cybersecurity (THE hot topic these days), Collaborative Solutions, Substation gridblock, and Fog computing in the form of Cisco IOx and partners. More about them in our next Energy Industry Blog! If you still need to register, click here. Looking forward to seeing you there!…

Read More >>

Tags: , , , , , , , , ,

Coordinated Malware Eradication Coalition Clarification

…etta’s report is unrelated to Cisco and the conclusions are their own. We focus on protecting our customers through technical analysis of the attacks, and creating protections against them. Cyber-attacks are global and the attacks must be stopped.  Our fundamental security objective is to protect all customers, be transparent, and be their trusted partner.  We hope this clears up any misconceptions….

Read More >>