AWS

August 27, 2020

PARTNER

Four Ways AppDynamics Gives Your AWS Applications a Competitive Edge

The goal of any IT team is to keep their users happy and maximize revenue. AppD helps ensure optimal user experience by measuring key performance metrics and reporting on any deviations in real-time.

July 29, 2020

SECURITY

Cisco SecureX – What’s driving our platform?

Along with the launch of Cisco SecureX came several new capabilities that help future-proof our platform. Learn about the latest innovations powering our integrated security approach.

July 8, 2020

SECURITY

Three reasons why Stealthwatch Cloud is a modern-day cloud security solution

John Heintz, Technical Solutions Architect at Cisco, sits down to talk Cisco Stealhwatch Cloud on the Cloud Unfiltered podcast. Learn why Cisco Stealthwatch is the premier modern-day public cloud security tool and supports a holistic approach to security.

July 6, 2020

SECURITY

Cisco and Amazon Web Services (AWS) Work Together to Accelerate Cloud Adoption

Cisco enables customers to protect data, applications and workloads deployed in AWS, supporting the AWS Shared Responsibility Model, and providing scalable, advanced security with consistent policies from datacenter to cloud.

May 27, 2020

SECURITY

Automated Threat Remediation in AWS with Stealthwatch Cloud

Stealthwatch Cloud customers often ask for remediation capabilities in the public cloud when threats are exposed. Find out how you can automatically remediate threats in AWS using Cisco Stealthwatch Cloud.

May 19, 2020

PARTNER

Cisco and AWS Strategic Partnership: Working to Secure Your Acceleration to the Cloud

To help AWS customers, Cisco—a market leader in security—has built a security architecture around four key pillars: visibility, segmentation, threat protection, and identify and access management. 

May 15, 2020

SECURITY

Tetration and AWS = Win-Win for Cloud and Workload Protection

Cloud providers like AWS offer many benefits - better capacity planning; rapid global application deployment. It’s the customer’s responsibility to secure their workloads. Inconsistent protection and lack of comprehensive visibility and control leave organization’s vulnerable to attack and data breach.