Cisco Secure Endpoints
Outsourcing Security Operations with Cisco Secure Endpoint
More organizations are outsourcing security operations to Managed Security Services Providers (MSSP). Hear a real-world use case on how one company is helping handle the security incidents of multiple customers. Tune in to the free webinar/demo.
Cheetah Revamps Its Technology to Adapt to Changes
John Hodson had been on the job for less than three months when the unthinkable happened. With the pandemic grinding the Western United States to a standstill, the new head of IT for Cheetah, a wholesale food supplier in the Bay Area, had to lay off staff and relinquish the company’s managed IT services. “The […]
Cisco Partner Port53 Helps Small Businesses Stay Safe with Cloud-Based Security
The global pandemic has spurred an onslaught of data breaches and cybersecurity incidents. It’s not a surprise because hackers, fraudsters, and scammers have always been opportunistic. And disruptive events have always created opportunities for malfeasance. According to the FBI, the volume of cyberattacks has increased by 400 percent since the beginning of the pandemic, with […]
Threat protection: The WastedLocker ransomware
What is WastedLocker and how do Cisco Security technologies stop it? In this blog, we walk through the infection process, alongside points where our technologies can detect and block the threat.
Crafting a New Universe of Multi-Vendor Security Integrations
Cisco Security Technical Alliance (CSTA) facilitates open multivendor product integrations across our Security products. Our largest launch to-date; today we announce new technology partners joining CSTA and over 50 new integrations. We now have grown to over 200 partners representing over 350 product-to-product integrations.
Securing Remote Work: Questions You Should Ask
Simplify and secure your remote work environment with Cisco Secure Remote Worker. It protects users working from anywhere, at any time, on any device. Unlike other options that employ a multi-vendor approach to remote work protection, we provide comprehensive security from ONE source, one vendor – not many.
5 security tools to protect your small business data
Cybersecurity is critical no matter a business’s size. Small business data is no less valuable to an attacker, and small businesses can benefit from the security strategies larger enterprises use.
Getting more value from your endpoint security tool #5: Querying Tips for Vulnerability & Compliance
Orbital Advanced Search has an entire category of queries dedicated to Posture Assessments to validate patch management, ensure endpoints comply with current policies, and more.
Getting more value from your endpoint security tool #4: Querying Tips for IT Operations
Orbital Advanced Search has an entire category dedicated to Posture Assessments which contains queries to check CPU data, network host connections, operating system information, installed programs, and more.