network security
Cisco Secure: Supporting NIST Cybersecurity Framework
2 min read
Mapping Cisco Security Products to NIST Cybersecurity Framework Categories. We discuss the basics of NIST then extend the mapping done earlier.
Secure and Save with Cisco Secure Firewall Threat Defense Virtual
2 min read
As we include more performance and feature enhancements to the Cisco Secure Firewall Threat Defense Virtual, learn how you can secure and save.
Back to the Future of Firewall
9 min read
Network firewall is not dead, but it must evolve to combat the insertion and visibility challenges. Grab an early look into this product transformation.
Cisco Secure Firewall Threat Defense Virtual now supported on Cisco HyperFlex
2 min read
Security is more complex with Threat Defense 7.0, it delivers support for Secure Firewall Threat Defense Virtual on Cisco HyperFlex.
Why Every Midsize Business Needs a Security Strategy
3 min read
Cisco recently released the 2021 Security Outcomes Study for SMBs, focusing on how small and midsize companies are investing in security to meet priorities.
Cisco SecureX with Secure Firewall: More Value Than Ever
2 min read
The SecureX + Secure Firewall integration is enhanced, simplifying security and enhancing efficiency.
Introducing continuous remote worker visibility and expanded data collection with Secure Network Analytics Release 7.3.2
5 min read
With Cisco Secure Network Analytics release, 7.3.2 users can gain complete and continuous remote worker visibility, expand data collection capabilities to experience further extended visibility and enhanced context, and more!
Snort 3: Rearchitected for Simplicity and Performance
3 min read
Snort has become the standard by which all network intrusion detection systems are measured. Snort 3, released in January 2021 is a significant upgrade.
Cisco Secure Firewall insertion using Cisco cAPIC in Azure
4 min read
Cisco cAPIC runs on Azure and provides automated policy and visibility of workloads. Secure Firewall Threat Defense integrates with the cloud ACI environment using a service graph, providing threat protection.
2