Your Network Is Rapidly Expanding – How do you secure it?
Today’s security teams have to mind various areas of their infrastructure, remote users and endpoints, and applications running everywhere in order to remain secure. How do you do it all?
The Future of the Email Security Market: The Importance of the Secure Email Gateway
Understanding the future of the email security market isn’t complete without a look at the importance of Secure Email Gateways and how they effectively protect cloud email platforms.
Go Agentless – Increase flexibility and prevent compromise from mobile devices in real time with ISE and Frontline.Clo …
Customers are ensuring mobile devices are safe, without agents and increasing flexibility while maintaining performance with Cisco and Frontline.Cloud
Announcing Cisco Tetration SaaS Offering Available in Europe
Tetration SaaS for workload security is now available in Europe. European enterprise, public sector or startup organizations now have a SaaS-based workload security solution, hosted in Europe. Take advantage of the security, scalability, and reliability of the Tetration SaaS platform to innovate and iterate faster; securely.
The Wolf Is Back…
Cisco Talos has discovered a new Android malware based on a leak of the DenDroid malware family. We named this malware “WolfRAT” due to strong links between this malware (and the command and control (C2) infrastructure) and Wolf Research, an infamous organization that developed interception and espionage-based malware and was publicly described by CSIS during VirusBulletin […]
Endpoint Security from Cisco Earns High Marks in Independent Malware Protection Test
Cisco Advanced Malware Protection (AMP) for Endpoints earned high marks in malware protection tests, while achieving the lowest false alarms in the first AV Comparatives Business Main Test Series for 2020.
Threat Roundup for May 8 to May 15
Today, Talos is publishing a glimpse into the most prevalent threats we’ve observed between May 8 and May 15. As with previous roundups, this post isn’t meant to be an in-depth analysis. Instead, this post will summarize the threats we’ve observed by highlighting key behavioral characteristics, indicators of compromise, and discussing how our customers are […]
Tetration and AWS = Win-Win for Cloud and Workload Protection
Cloud providers like AWS offer many benefits - better capacity planning; rapid global application deployment. It’s the customer’s responsibility to secure their workloads. Inconsistent protection and lack of comprehensive visibility and control leave organization’s vulnerable to attack and data breach.
Why Cisco Security?
Explore our Products & Services
Subscribe to our Blogs
Stay up to date and get the latest blogs from Cisco Security