All Blogs

September 18, 2020

SECURITY

Detect even the sneakiest insider threats with Cisco Stealthwatch

Insider threats are difficult to detect and can be devastating for your business. Detect and stop insider threats dead in their tracks with Cisco Stealthwatch.

September 17, 2020

COLLABORATION

Cisco Webex Room Panorama for The Hybrid Meeting Room

With beautiful design and powerful functionality, the Room Panorama brings people together, whether it is across the table or across the globe— providing a best in business, first-class meeting experience.

September 17, 2020

COLLABORATION

Monthly Update: Boost Your Net Promoter Scores and Workplace Collaboration with Cisco Contact Center Solutions

This month, we’re introducing enhancements to Webex Experience Management that helps businesses understand their customer journeys across all touchpoints so they can make improvements resulting in higher customer satisfaction and lower churn.

September 17, 2020

SECURITY

MITRE ATT&CK: The Magic of Endpoint Protection

In our first blog, we introduced the Magic of Mitigations. They’re the key to getting started with MITRE ATT&CK. Now let’s look at some of the most magical ones, starting today with Behavior Prevention on Endpoint (M1040), Exploit Protection (M1050) and Execution Prevention (M1038). Wait, what’s the difference? At a quick glance, they might all […]

Cisco’s social investments in India: The pandemic’s impact on skills gaps

Through our social investment programs, the Cisco CSR team in India has invested in countrywide blended learning ed-tech programs and digitally transforming our vocational skills institutions. With the right partnerships, we hope to scale this effort and build a brighter future for Indian youth.

September 17, 2020

DATA CENTER

Streamline NX-OS fabric deployments with Cisco DCNM and Red Hat Ansible

Today I will give an overview of our recent integration between Cisco Data Center Network Manager (DCNM) and Red Hat Ansible to streamline NX-OS fabric deployments. Introduction Traditionally in data center network management, configuration was often a manual, error prone process, with an operator going device by device to make changes, with every change requiring […]

September 17, 2020

GOVERNMENT

Building Security and Trust in Government

As governments look to guide their organizations and constituents through the pandemic and into an increasingly unknown future, you will need a security partner you can trust.