Cisco Firepower Threat Defense (FTD)

September 11, 2023

GOVERNMENT

Enhancing Firepower at the National Security Agency

4 min read

Did you know the NSA has just released the Cisco Firepower Threat Defense (FTD) Hardening Guide? Learn how it can help your agency strengthen its cyber defense.

September 8, 2023

SECURITY

The New Normal is Here with Secure Firewall 4200 Series and Threat Defense 7.4

8 min read

Read on for an in-depth discussion of our latest Cisco Secure Firewall announcement, including the new 4200 Series appliance, and 7.4 software features.

August 9, 2023

PARTNER

Maximize Security and Embrace Firewall-as-a-Service from Managed Security Service Providers

4 min read

For Cisco Partners—particularly Managed Service Security Providers (MSSPs)—there is a huge opportunity to help customers update/refresh their network infrastructure and network firewalls to keep up with modern infrastructure and use cases. And secure firewalls are a foundational component of multiple sales motions and sales opportunities.

September 14, 2020

DEVELOPER

Firepower API’s Allow an Integrated Security Architecture

3 min read

Join the Security Webinar Series: Discover the great advantage of using Firepower APIs to automate device deployments, policy updates, and security incident remediation without human intervention.

September 14, 2020

SECURITY

Network Security Efficacy in the Age of Pervasive TLS Encryption

6 min read

As encryption becomes increasingly pervasive, network security administrators can struggle to maintain an acceptable level of security efficacy.

June 6, 2019

SECURITY

A Bridge to the Future of the Firewall

2 min read

With Cisco Defense Orchestrator, organizations can seamlessly harmonize security policies across tens or thousands of devices – including ASA, and in the very near future, FTD and Meraki MX.

April 17, 2019

SECURITY

To the Depth of TLS Invisibility and Beyond

3 min read

Encrypted traffic is changing the threat landscape...Encryption technology enables greater privacy and security to communicate and transact business online. Mobile, cloud, and web applications rely on well-implemented encryption mechanisms, using keys and certificates, to ensure confidentiality and trust.