2016 – What a Year for Cisco Security
What a giant year for Cisco Security! In 2016, we pursued our effective security architecture with innovative solutions – from the network to the endpoint to the cloud. I couldn’t...
What a giant year for Cisco Security! In 2016, we pursued our effective security architecture with innovative solutions – from the network to the endpoint to the cloud. I couldn’t...
IEC 60870-5-104 Protocol Detection Rules Cisco Talos has released 33 Snort rules which are used to analyze/inspect IEC 60870-5-104 network traffic. These rules will help Industrial Control Systems/Supervisory Control and...
Today’s digital economy is growing at a phenomenal rate. All modes of commerce from entertainment to finance and retail have moved on-line. You name it; there is an on-line business...
How Cisco provided the wireless network infrastructure for the first debate and helped deploy wireless networks at the sites of the second and third Presidential debates.
And why 100% detection is grossly misleading It is with great pride that we received the latest Breach Detection Report from NSS Labs, in which Cisco achieved a 100% detection...
Cisco Firepower NGFW recognized with Best of Interop 2016 Award for Security Each year at Interop, a group of the most influential IT practitioners, analysts and professionals vote on the...
I talk to a lot of customers and partners in the Service Provider space, and among the many conversations, I notice a common set of concerns centered around a simple...
Cisco announced “the industry’s first fully integrated, threat-focused Next Generation Firewall. “ But what the heck is ‘fully integrated’ and ‘threat focused?’ These sound like important distinctions.
IT Teams gain insight and focus with the industry’s most comprehensive NGFW management - before, during and after attacks. As we discussed in our last two posts, most organizations today...