Cisco named a Visionary for AMP for Endpoints in Gartner’s 2018 Magic Quadrant for Endpoint Protection Platforms
Gartner has named AMP for Endpoints a Visionary in the 2018 Magic Quadrant for Endpoint Protection Platforms (EPP). Cisco is proud to be included in this auspicious report and...
When Walls Come Down: Working Together to Protect IoT Devices
When you begin remodeling an older home you realize that some walls are there for good reasons. Others block our modern, open-floor-plan lifestyles and can come down. Years ago, factories and utilities separated their Information Technology (IT) and Operations Technology (OT) teams. The thinking was that such walls helped ensure reliability and uptime so that […]
Highlights of Effective Security from Cisco Live Las Vegas
In case you missed it, here are some key takeaways from John Stewart's Chief Security Officere keynote, Cisco Encrypted Threat Analytics, and Cisco IoT Threat Defense.
Cisco Firepower NGFW Delivers Unparalleled Threat Defense in NSS Labs Testing
Real-World Testing to Inform Your NGFW Buying Decision We’re excited to share with you the latest NSS Labs NGFW test results. In the most rigorous independent NGFW testing to date, Cisco outperformed eight competitors in security effectiveness, blocking 100% of evasions and surpassing four vendors by over 50 points. You can download the reports to […]
A Steady Drumbeat for Simple, Open and Automated
I continue to beat the drum for solutions that are simple, open, and automated because it’s something I’m passionate about and Cisco Security is deeply committed to. It’s the clear path forward to security as a force multiplier – helping you to improve your security posture with your existing resources. In March, I gave a […]
Less is More – Fewer Cybersecurity Vendors Yield More Effective Security
A traditional, tactical approach to security -- encounter a new threat, buy another box -- usually results in a complex security “frankenstructure” of products. Cisco delivers greater simplicity and automation.
Short on Security Resources? Try These Force Multipliers
One in four organizations are exposed for six months or longer due to a lack of qualified security workers. And in Europe almost one-third of cyber security job openings remain unfilled. That’s the challenging picture reported by ISACA at this year’s RSA Conference. You’re thinking, “tell me something I don’t know.” The Benchmark study in […]
Staying Ahead of the Hack: Operationalizing Threat Intelligence to Strengthen Defenses
Many pieces of forensic evidence come into play when investigating a crime scene – analysis of fingerprints, DNA, shoe prints, videos/photos, ballistics, etc. By analyzing the data, a picture of...
Effective Endpoint Security – More than Meets the Eye
One of your sales people, Susan, is on the road putting some finishing touches on a presentation before a big meeting. Using the hotel Wi-Fi she does a quick search to see if there’s any relevant company or industry news she needs to know about before meeting with the client. She clicks on several websites, […]