ASA

November 1, 2016

NETWORKING

Simplifying Security for Cisco Customers with New Cisco ONE Advanced Security Suites

2 min read

Security is the single biggest concern for our customers, but cobbling together security products from dozens of vendors only makes security infrastructure complex and difficult to manage.

August 17, 2016

SECURITY

The Shadow Brokers EPICBANANA and EXTRABACON Exploits

10 min read

UPDATE April 20, 2017 Cisco continues to evaluate potential implications of the activities and information posted publicly by the Shadow Brokers Group.  We launched an investigation to analyze the new files posted on April 14th, 2017, and so far have not found any new vulnerabilities or exploits that affect Cisco products and services. Cisco PSIRT will […]

June 27, 2016

DATA CENTER

Micro Segmentation and Cisco ACI – From Theory to Practice Part II

6 min read

This is Part II in a four part series of blogs.  This is the second of a series of blogs where we will illustrate how to leverage Cisco ACI to implement Micro Segmentation. In the first blog we described how to use ACI micro segmentation to implement a web application that uses a tier of […]

June 24, 2015

PERSPECTIVES

Like Chalk and Cheese: Cisco ASA 5506-X with Release 9.4.1 – Policy Based Routing

1 min read

Earlier this Year, Cisco introduced the Cisco ASA 5506-X with FirePOWER Services. This Model should replace the successful and smallest Security...

June 11, 2015

SECURITY

Cisco brings proven ASA security to AWS marketplace customers

1 min read

We are very excited to announce the availability of Cisco’s best-selling Cisco Adaptive Security Virtual Appliance (ASAv) for the Amazon Web Services (AWS) cloud platform. Our customers can now use Cisco ASAv to protect their on-demand AWS workloads and achieve consistency across hybrid cloud environments. The Cisco Adaptive Security Virtual Appliance (ASAv) runs the same software […]

March 5, 2015

PERSPECTIVES

Plan to Be Secure; Secure to Your Plan

3 min read

The routine goes something like this. First a breach of security occurs somewhere in the enterprise, it could be something as small as a single computer getting infected or it could be a massive data loss. It seems like that’s a wide range of events, but often the reaction in an enterprise is the same. […]