Articles
Get a Security System, not a Security Smorgasbord
2 min read
Cisco is helping customers simplify their security ecosystems with powerful tools that work together to automatically thwart cyber attacks.
7 Questions about the Firewall: A Chat with Cisco featuring Gartner
1 min read
Remember when people used to say, “the firewall is dead”? The numbers tell a different story. Gartner forecasts that this market will become one of the single largest product markets in all of cybersecurity.
Kill Complexity with Cisco Defense Orchestrator
2 min read
Managing security policies is complex and time-consuming, especially when your network has multiple firewalls deployed across many locations. Cisco Defense Orchestrator is here to make your job easier.
Can your firewall do that?
4 min read
Part 3: Explore how a Cisco Next-Generation Firewall (NGFW) can help you become less overwhelmed and more empowered by automating networking and security operations, saving you time and reducing complexity.
Cisco Firewall Named a 2018 Global Market Leader by Frost and Sullivan
5 min read
Frost & Sullivan has awarded Cisco the 2018 Market Leadership Award in the Global Network Firewall Market for recognizing market needs and evolving firewall platforms to meet those needs.
Can your firewall do that?
5 min read
Part 2: Visibility to detect and stop threats fast. Many network and security teams struggle with visibility into threat activity. They need exceptional visibility to detect and eliminate active threats before damage is done.
Can your firewall do that?
4 min read
Part 1: Prevent breaches and keep your business moving. Explore how a Cisco Next-Generation Firewall, as a core component of your security defenses, can offer a solution to cyber threats.
3 Reasons to Upgrade from Cisco ASA to Cisco Firepower NGFW Today
3 min read
You have a Cisco ASA stateful firewall. You like it. It’s reliable. You think, “It works… if it ain’t broke, don’t fix it.” But you’ve had your ASA for years now, and during that time, threats have evolved.
Introducing Exploit Prevention to Stop File-Less Attacks
3 min read
In war, any good military strategist will try to exploit their enemy’s weaknesses. Cybercriminals are no different. Their latest tactic: use file-less attacks to exploit vulnerabilities in everyday applications.