endpoint security
How We Apply Machine Learning in Cisco Advanced Threat Solutions
4 min read
There is a lot of talk lately about machine learning when it comes to cyber security. It seems like you can’t have a conversation about one without the other....
Demystifying: Next-Generation Endpoint Security
5 min read
The term “next-generation” is used quite frequently across the tech industry – it’s not limited to security. Let's demystify the term and its value for endpoint security.
Cisco Security Connector Expands EMM/UEM Integrations with VMware Workspace ONE On-Premises
1 min read
VMware Workspace ONE (previously known as AirWatch) has been the driving force within the mobile device management space. Their technology has changed the way businesses mobilize their workforce by providing...
Demystifying: Machine Learning in Endpoint Security
6 min read
Deciding on a new endpoint security vendor is tough. From your very first search, you’ll get a lot of overused terms thrown at you – machine learning, artificial intelligence, next-generation...
Secure Your Mobile Connections with New IP Blocking Feature
2 min read
When downloading an application from the App Store, do you actually check the logistics of it? For example, how is it connecting to the internet? Or an even more relatable...
NSS Labs Awards Recommended Rating to Cisco Endpoint Security
2 min read
In the hyper-competitive world of endpoints security, proof of efficacy is the only real impartial way to valuably differentiate. However, public testing for next generation endpoint security solutions such as...
Step Up Your Mobile Security Game with Cisco Security Connector
2 min read
The alarm on your phone goes off at 6:00 AM. You smash the snooze button and fall back asleep for another 15 minutes. The alarm rings again and now it’s...
Have Your Cake and Eat it Too With Next-Generation Endpoint Security from Cisco
2 min read
When faced with an either/or situation, people typically prefer not to choose. We want the best of both worlds. Rarely does someone want peanut butter OR jelly. Have cake? You...
Are You Using Yesterday’s Tools to Stop Today’s Threats?
3 min read
Take a look around you. What’s the average age of the technology you see? Your cell phone is probably 2 years old at most. Your laptop may be slightly older....