ROCTEL Helps ifac Decrease the Digital Divide in Ireland
For millions of people around the world, unreliable—or completely unavailable—internet service is their reality. ROCTEL and Cisco have partnered together to help ifac decrease the digital divide and provide valuable services for farmers across rural Ireland.
The Advantages of Next-Generation Firewalls (NGFWs)
Read what other IT professionals are saying about Cisco ASA and Firepower NGFW devices enabling greater visibility into the network and applications while improving threat mitigation.
The death of the network perimeter and the firewall? Not so fast.
The importance of the firewall has become more relevant than ever before. Firewalling needs to be about delivering world-class security controls – the key elements for preventing, detecting, and stopping attacks faster and more accurately.
Cisco Named a Leader in the 2019 Gartner Magic Quadrant for Network Firewalls
Cisco once again named a Leader in the Gartner Magic Quadrant for Network Firewalls, validating our multi-year journey to reimagine the firewall as the foundation of integrated security platforms.
Top Security and Risk Management Trends Unveiled at Gartner Security and Risk Management Summit 2019
For CISOs looking to network with peers, and security professionals looking for practical advice – Cisco has you covered at the 2019 Gartner Security and Risk Management Summit.
Security Analytics and Logging: Supercharging FirePower with Stealthwatch
When we consider network threat detection, most of us immediately think of signature and rule-based intrusion detection and prevention systems (IDPSs). However, it is a little discussed fact that the...
Cisco and BT at 30: Creating a Future-Proof Security Solution
Some things just get better with age. And you could say the same for the over 30-year partnership between Cisco and British Telecom (BT).
Securing Government: It all starts at the DNS Layer
One common thread between cyber-attacks is external communication. Malicious communication typically starts, or is exploited, at the DNS layer. Find out how to defend it.