Firepower Management Center
The Firewall: The foundation for a robust Security Platform
4 min read
Does a single view, a single point of multivendor integration, or a single place to conduct workflows and track metrics exist? What if, we said yes...
Announcing Duo’s MFA for Cisco’s Firepower Threat Defense (FTD)
1 min read
We recently extended our ability to secure Cisco offerings with the beta availability of Duo's MFA for AnyConnect running on Cisco’s FirePower Threat Defense (FTD). You can learn more about Cisco FTD here. Previously, you were only able to secure your AnyConnect VPN client running on Adaptive Security Appliance (ASA) products.
Protecting SugarCreek’s 24/7 Food Manufacturing Across Four States
1 min read
SugarCreek Brandworthy food solutions is a growing, mid-western food manufacturer helping some of the industry’s largest and best-known companies develop innovative food solutions.
Secure Multi-Tenancy Part 2: Going Multi-Instance
5 min read
The Firepower multi-instance capability represents a unique and novel approach to deploying secure multi-tenancy.
Security Automation: Putting the odds ever in your favor
5 min read
“May the odds be ever in your favor…” It was the irony of this pithy statement that sent the Hunger Games heroine, Katniss Everdeen, to an almost certain death....
Cisco and Downer Partnership Delivers First Smart Cities Project
1 min read
Cisco and Downer have an ongoing strategic Internet of Things (IoT) partnership that was recently expanded to include Smart Cities. Downer, a diversified engineering and services company headquartered in...
Automate Threat Intelligence Using Cisco Threat Intelligence Director
3 min read
Join blog co-author, Pramod Chandrashekar, at CLEUR for his session "Introduction to Cisco Threat Intelligence Director APIs." [DEVNET-1774]
Staying Ahead of the Hack: Operationalizing Threat Intelligence to Strengthen Defenses
3 min read
Many pieces of forensic evidence come into play when investigating a crime scene – analysis of fingerprints, DNA, shoe prints, videos/photos, ballistics, etc. By analyzing the data, a picture of...
To be Effective, Security Needs to Be a Force Multiplier
4 min read
Effective security is simple, open, and automated. We’ve already talked about simple and open. Now let’s talk about automated. Security admins can relate to this scenario. You just learned of an infected system in your environment of thousands of devices. How many others are affected? That’s hard to figure out even in elite operations. What […]