Cisco Secure Endpoint
Introducing the new ‘Defending Against Critical Threats’ report
How has the #cyberthreat landscape evolved in the last year? Find out in our annual Defending Against Critical Threats report.
Creating a Path to Successful Security Hygiene
Read the “Security Hygiene and Posture Management” eBook to learn how you can better identify cyber-risks and defense gaps to improve your overall security best practices.
Relevant and Extended Detection with SecureX, Part Four: Secure Cloud Analytics Detections
Building upon the concept of a behaviour-based detections, this piece discusses detections from Cisco Secure Cloud Analytics, when & how to promote them to SecureX as incidents, and how to leverage and extend the detections in SecureX.
Defending Against Critical Threats: Analyzing Key Trends, Part 2
We look at some more highlights from our annual “Defending Against Critical Threats” webinar. Today's threats include Log4J, planning for Zero Days, Emotet, and the rise of Mac OS malware.
Cisco Bolsters Endpoint Security to Stop Threats with Simple, Unified Defense
Cyberattacks hit businesses daily, but Cisco Secure Endpoint hits back harder with a cloud-delivered, single agent solution against ransomware.
Relevant and Extended Detection with SecureX, Part Three: Behaviour-Based Detections with Secure Network Analytics
Discover how to leverage Secure Network Analytics to deploy Behaviour-Based Detections, making them more relevant and actionable with Cisco SecureX.
Defending Against Log4j Exploits with Cisco Secure Endpoint
Learn how Cisco Secure Endpoint can rapidly protect your environment from attackers exploiting the Log4j vulnerability with robust prevention and advanced detection and response capabilities.
Relevant and Extended Detection with SecureX, Part Two: Endpoint Detections
Discover how to automatically extend Cisco Secure Endpoint detections, making them more relevant and actionable with Cisco SecureX.
How to Build an Integrated Security Posture Using XDR
Cisco SecureX takes the pain out of integration by connecting the different vendor products in your security environment together to improve overall security posture and have more visibility.