Security

September 11, 2018

SECURITY

Cracking the Code – How to Measure the Real Value of Information Security Management

To help measure the success and value of information security organizations, Cisco has developed a process to capture and quantify losses from security incidents, comparing them against established industry benchmarks.

September 10, 2018

SECURITY

The Role of Visibility in SecOps

The bad guys aren’t going away. The good news is Next Generation Firewalls, Malware Protection, and Access Control are not only improving, but in some cases, working in concert together.

September 6, 2018

SECURITY

Deploying Stealthwatch Cloud in a Google GKE Kubernetes Cluster

Cisco Stealthwatch Cloud provides an unprecedented level of visibility and security analytic capabilities within a Kubernetes cluster. Here's how easy it is to deploy into an existing K8s cluster.

August 31, 2018

SECURITY

Know When to Have a Dedicated NGIPS vs. NGFW

The distinction between use case scenarios for standalone NGIPS vs. NGFW deployments can often be tricky to navigate. 

August 29, 2018

SECURITY

New Study Shows Correlating Network and Endpoint Data is Highly Manual

We recently commissioned Forrester research to survey IT security professionals to find out what their desired end state was when it came to correlating security intelligence from network and endpoint....

August 28, 2018

SECURITY

Cognitive Intelligence: Empowering Security Analysts, Defeating Polymorphic Malware

In psychology, the term “cognition” refers to a human function that is involved in gaining knowledge and intelligence. It helps describe how people process information and how the treatment...

August 27, 2018

SECURITY

Jamf Pro now integrated with Cisco Security Connector

Cisco Security Connector is now integrated with Jamf Pro (formerly known as the Casper Suite), a leading Enterprise Mobility Management (EMM) tool.

August 26, 2018

SECURITY

Protecting SugarCreek’s 24/7 Food Manufacturing Across Four States

SugarCreek Brandworthy food solutions is a growing, mid-western food manufacturer helping some of the industry’s largest and best-known companies develop innovative food solutions.

August 25, 2018

SECURITY

Why Organizations With Sensitive Research or Intellectual Property Need a Zero Trust Cybersecurity Framework Approach

With Zero Trust moving you away from the perimeter security approach towards a framework protecting sensitive data, it opens up a number of situations...