Better: Cisco Security Drives Innovation, Growth and Empowers Customers
Today, 250,000 organizations globally are placing their trust in Cisco Security. With our world-leading threat intelligence by Cisco Talos, we block billions of threats every day.
Happy Birthday, Threat Response: Only a year old, but boy have you seen some things!
Released only a year ago, Threat Response is used in 3,600+ SOCs, and has added value in organizations without full SOCs. More impressive: the rate of innovation within the application.
MobileIron UEM Certified as Cisco Security Connector Compatible
MobileIron was one of the first integration partners with Cisco Security Connector (CSC) for supervised iOS devices.
Security with Privacy – Solving the encryption problem without decryption
Cisco has also developed several mechanisms in core network infrastructure and services to help organisations detect threats and enforce AUP without breaking applications and user privacy.
For threat correlation across endpoint, network, and cloud – connect the dots
When I was a kid, I used to love dot-to-dot books. I enjoyed formulating a guess of what the picture was, the hunt in finding all the dots, the satisfaction of connecting them all together, and the excitement of the final picture coming into view to either confirm, or deny, my suspicions of what I […]
Uncover the Where, When, and How of an Attack with “Trajectory” from Cisco AMP for Endpoints
You’re walking down the sidewalk, headphones in your ears, music blasting, and your head is buried in your phone reading a text message. CRUNCH. You look down and you’ve just stepped in a pile of… (no, not that)… broken glass. A car parked on the street was broken-into, and the glass from the shattered window […]
Deep Dive into AMP and Threat Grid integration with Cisco Email Security
In our previous blog posts about AMP and Threat Grid on Cisco Email Security, we have discussed the approach to email security, that organizations could take to protect themselves against advanced threats. We have as well discussed the components of the solution and how they work together to protect customers from the number one threat […]
From the Trenches: 5 Ways Customers are Improving Security with Cisco AMP for Endpoints
Does this sound like a day in your IT security life? Wake up, get coffee, drive to work, and battle an almost constant onslaught of attacks, while playing whack-a-mole with too many alerts. If so, we get it. You never know where the next attack will come from. And you’re probably on to the fact […]
Addressing Healthcare Security Challenges
It’s a gross understatement to say that security is critical in healthcare, where a breach can not only impact an organization’s effectiveness and reputation but also affect patient privacy and—worst-case scenario—health and safety. If you are reading this blog, you no doubt already know the most common challenges to securing digital healthcare organizations, from ensuring […]