AWS
Cisco and Amazon Web Services (AWS) Work Together to Accelerate Cloud Adoption
Cisco enables customers to protect data, applications and workloads deployed in AWS, supporting the AWS Shared Responsibility Model, and providing scalable, advanced security with consistent policies from datacenter to cloud.
Cisco Remote Access VPN architecture for Amazon Web Services (AWS)
This architecture covers DNS based load balancing for RAVPN connections for a single VPC (multi-az) and multi-VPC (multi-az) architecture.
Automated Threat Remediation in AWS with Stealthwatch Cloud
Stealthwatch Cloud customers often ask for remediation capabilities in the public cloud when threats are exposed. Find out how you can automatically remediate threats in AWS using Cisco Stealthwatch Cloud.
Cisco and AWS Strategic Partnership: Working to Secure Your Acceleration to the Cloud
To help AWS customers, Cisco—a market leader in security—has built a security architecture around four key pillars: visibility, segmentation, threat protection, and identify and access management.
Tetration and AWS = Win-Win for Cloud and Workload Protection
Cloud providers like AWS offer many benefits - better capacity planning; rapid global application deployment. It’s the customer’s responsibility to secure their workloads. Inconsistent protection and lack of comprehensive visibility and control leave organization’s vulnerable to attack and data breach.
Cisco Secure Cloud Architecture for AWS
Cisco Secure Cloud Architecture for AWS defines security controls to protect workloads & applications deployed in AWS. It combines AWS security controls with Cisco Security controls to provide unmatched security.
Top 5 features of a Network Traffic Analysis (NTA) tool- Why you need Stealthwatch now more than ever
Top 5 features of an NTA tool as stated by Enterprise Strategy Group and the Information Systems Security Association, and why CISOs need Stealthwatch now more than ever.
Understanding the Shared Responsibility Model: Securing Public Cloud Just Got Easier
Securing public cloud assets and services is critical, but deciding how or what is secured can be confusing. The shared responsibility model clarifies who is responsible for securing what, strengthening your security posture.
Five ways to detect early signs of a breach using the network
Continuous network monitoring is a necessary component of effective breach defense, to be able to detect threats in real-time before they turn into a high impact incident.