- Our Favorite Topics:
Introducing continuous remote worker visibility and expanded data collection with Secure Network Analytics Release 7.3.2
5 min read
With Cisco Secure Network Analytics release, 7.3.2 users can gain complete and continuous remote worker visibility, expand data collection capabilities to experience further extended visibility and enhanced context, and more!
Snort 3: Rearchitected for Simplicity and Performance
3 min read
Snort has become the standard by which all network intrusion detection systems are measured. Snort 3, released in January 2021 is a significant upgrade.
Cisco Secure Firewall insertion using Cisco cAPIC in Azure
4 min read
Cisco cAPIC runs on Azure and provides automated policy and visibility of workloads. Secure Firewall Threat Defense integrates with the cloud ACI environment using a service graph, providing threat protection.
Secure Workload and Secure Firewall – Unified Segmentation
3 min read
Firewalls must keep pace with today’s dynamic applications. Now, Cisco NetWORK redefines network security, empowering NetOps to run at DevOps speed. Automated dynamic policies integrate network and workload-level control, securing CI/CD environments.
Cyber Hygiene: An ounce of prevention is worth a pound of incident response
3 min read
In cybersecurity, good hygiene can improve outcomes and reduce costs. Learn what’s needed to adequately protect assets and your business.
Going on-premise with SecureX orchestration remote
2 min read
Introducing SecureX Orchestration Remote. This new feature allows you to start integrating on-premise resources into your orchestration workflows. Learn the value and how to get started.
Scalable Security with Cisco Secure Firewall Cloud Native
4 min read
Dive deeper into how Cisco Secure Firewall Cloud Native gives you the flexibility to provision, run, and scale containerized security services.
TrustSec Policy Analytics – Part One: What are policy analytics?
4 min read
Cisco Secure Network Analytics' new TrustSec Analytics reports enable users to visualize group communications, validate policies, streamline policy violation investigations, and accelerate policy adoption efforts
Key Takeaway from the Colonial Pipeline Attack
5 min read
The recent cyber-attack on the Colonial Pipeline had a major impact on the life of millions of Americans. What can we learn from it to start properly securing critical infrastructures?
Cisco Cybersecurity Viewpoints
Where security insights and innovation meet. Read the e-book, see the video, dive into the infographic and more...
Why Cisco Security?
Explore our Products & Services
1