Increasing distribution grid reliability with FLISR enabled by Cisco IoT Network
Get the latest updates on our Cisco Validated Design (CVD) for Distribution Automation.
Detect even the sneakiest insider threats with Cisco Stealthwatch
Insider threats are difficult to detect and can be devastating for your business. Detect and stop insider threats dead in their tracks with Cisco Stealthwatch.
Cisco Webex Room Panorama for The Hybrid Meeting Room
With beautiful design and powerful functionality, the Room Panorama brings people together, whether it is across the table or across the globe— providing a best in business, first-class meeting experience.
Monthly Update: Boost Your Net Promoter Scores and Workplace Collaboration with Cisco Contact Center Solutions
This month, we’re introducing enhancements to Webex Experience Management that helps businesses understand their customer journeys across all touchpoints so they can make improvements resulting in higher customer satisfaction and lower churn.
MITRE ATT&CK: The Magic of Endpoint Protection
In our first blog, we introduced the Magic of Mitigations. They’re the key to getting started with MITRE ATT&CK. Now let’s look at some of the most magical ones, starting today with Behavior Prevention on Endpoint (M1040), Exploit Protection (M1050) and Execution Prevention (M1038). Wait, what’s the difference? At a quick glance, they might all […]
Cisco’s social investments in India: The pandemic’s impact on skills gaps
Through our social investment programs, the Cisco CSR team in India has invested in countrywide blended learning ed-tech programs and digitally transforming our vocational skills institutions. With the right partnerships, we hope to scale this effort and build a brighter future for Indian youth.
Streamline NX-OS fabric deployments with Cisco DCNM and Red Hat Ansible
Today I will give an overview of our recent integration between Cisco Data Center Network Manager (DCNM) and Red Hat Ansible to streamline NX-OS fabric deployments. Introduction Traditionally in data center network management, configuration was often a manual, error prone process, with an operator going device by device to make changes, with every change requiring […]