Articles
Packing More Power Into Cisco XDR’s Integration Toolkit
6 min read
Cisco XDR and the Swiss Army knife share a theme of a versatile, integrated, and unified platform, giving users myriad solutions to take on diverse challenges.
Customize Your Defense: Unlock Cisco XDR With Key Integrations
2 min read
The new Cisco XDR Connect tool helps users to search, browse, and view the details of all available XDR integrations and automation content.
Developing With Cisco XDR at Cisco Live San Diego ‘25
4 min read
Join us at Cisco Live San Diego to explore Cisco XDR’s latest innovations, including custom integrations, AI automation, and community features. Don’t miss out!
The Benefits of a Broad and Open Integration Ecosystem
4 min read
Since inception, Cisco XDR has followed the Open XDR philosophy. We integrate telemetry and data from dozens of Cisco and third-party security solutions.
Threat Intelligence in SecureX: Fast, Free, or Easy (Pick any three)
3 min read
Configuring supported relay modules in SecureX has been recently simplified, greatly improving the leverage of many tools you may already use, in more effective and efficient ways. By how much, and to what benefit? Read on to find out.
Announcing SecureX Academy
2 min read
A core pillar of the SecureX mission is to simplify security. With SecureX Academy, we are simplifying SecureX adoption and integration. Check it out!
Cisco Threat Response Plugin: Defeat Threats With Just a Few Clicks
3 min read
With Cisco Threat Response, customers receive a powerful solution that can streamline and simplify detection, investigation, and remediation of threats. All of this can be accessed from a very easy, powerful tool in the new browser plugin (for Chrome and Firefox).
Threat Grid Cloud updates, summer 2018
4 min read
Every month, the Threat Grid development team brings you new features and capabilities in the Threat Grid cloud, and these past summer months were no different.
Cisco Visibility Casebooks: Saving You Time When You Need It Most
2 min read
Time is critical when facing an incoming attack. Security analysts and incident responders must quickly detect, investigate, understand, and react quickly to limit any potential damage.
- 1
- 2