ciscosolarwindsresponse

February 25, 2021

SECURITY

Detecting and Responding to SolarWinds Infrastructure Attack with Cisco Secure Analytics

5 min read

Sunburst exposed a weak link in our supply chain. Now what? Read our new blog and learn how visibility is the first step to identify all network resources, especially rogue and forgotten servers that could leave an open door for attackers. And the next step? Well, we cover that too with a complete “How to Guide” with Secure Analytics.

January 22, 2021

SECURITY

Automate your way to success with Cisco SecureX

4 min read

Get started with SecureX orchestration and automation. In this blog, we'll cover how you can get started and ultimately take back control with an integrated platform approach.

January 19, 2021

SECURITY

The SolarWinds Orion Breach, and What You Should Know

5 min read

On December 11th, 2020, the U.S. government and the company SolarWinds disclosed a breach into their SolarWinds Orion Platform network management software. Learn how Cisco can help build resilience and safety of your organization.

January 14, 2021

SECURITY

Pinpoint Your SolarWinds Exposure with Cisco Endpoint Security Analytics

2 min read

With Cisco Endpoint Security Analytics (CESA) in your toolkit, you can quickly assess your own exposure and address endpoint visibility gaps left behind by traditional EDR/EPP solutions and network security analytics platforms.

January 14, 2021

SECURITY

Cisco Secure Workload Immediate Actions in Response to “SUNBURST” Trojan and Backdoor

4 min read

Cisco Secure Workload can directly support both initial steps to assist in the identification of compromised assets and the application of network restrictions to control network traffic through central automation of distributed firewalls at the workload level.

January 11, 2021

SECURITY

Minimize Risk and Impact with a Security Platform Approach

5 min read

Cisco SecureX is a cloud-native, built-in platform experience that gives your security infrastructure a makeover from a series of disjointed solutions into a fully integrated defense to deal with the threat landscape.