Cisco AMP

July 23, 2020

SECURITY

Cisco Secure Cloud Architecture for Azure

3 min read

Cisco Secure Cloud Architecture for Azure defines security controls to protect workloads & applications deployed in Azure. It combines Azure security controls with Cisco Security controls to provide unmatched security.

July 17, 2020

SECURITY

Unleashing SecureX on a real Cyber Campaign

9 min read

Let’s take a look under the hood as the industry learns to define what we should all expect from a security platform. And while I have your attention, I am going to attempt to thoroughly explain how SecureX delivers simplicity, visibility and efficiency through a cloud-native, built-in platform with an emerging use case.

March 4, 2019

SECURITY

Better: Cisco Security Drives Innovation, Growth and Empowers Customers

4 min read

Today, 250,000 organizations globally are placing their trust in Cisco Security. With our world-leading threat intelligence by Cisco Talos, we block billions of threats every day.

February 28, 2019

SECURITY

Happy Birthday, Threat Response: Only a year old, but boy have you seen some things!

5 min read

Released only a year ago, Threat Response is used in 3,600+ SOCs, and has added value in organizations without full SOCs. More impressive: the rate of innovation within the application.

November 20, 2018

SECURITY

MobileIron UEM Certified as Cisco Security Connector Compatible

1 min read

MobileIron was one of the first integration partners with Cisco Security Connector (CSC) for supervised iOS devices.

July 11, 2018

SECURITY

Security with Privacy – Solving the encryption problem without decryption

2 min read

Cisco has also developed several mechanisms in core network infrastructure and services to help organisations detect threats and enforce AUP without breaking applications and user privacy.

November 8, 2017

SECURITY

For threat correlation across endpoint, network, and cloud – connect the dots

2 min read

When I was a kid, I used to love dot-to-dot books. I enjoyed formulating a guess of what the picture was, the hunt in finding all the dots, the satisfaction of connecting them all together, and the excitement of the final picture coming into view to either confirm, or deny, my suspicions of what I […]

September 26, 2017

SECURITY

Uncover the Where, When, and How of an Attack with “Trajectory” from Cisco AMP for Endpoints

3 min read

You’re walking down the sidewalk, headphones in your ears, music blasting, and your head is buried in your phone reading a text message. CRUNCH. You look down and you’ve just stepped in a pile of… (no, not that)… broken glass. A car parked on the street was broken-into, and the glass from the shattered window […]