Cisco Firepower Threat Defense (FTD)
Enhancing Firepower at the National Security Agency
4 min read
Did you know the NSA has just released the Cisco Firepower Threat Defense (FTD) Hardening Guide? Learn how it can help your agency strengthen its cyber defense.
The New Normal is Here with Secure Firewall 4200 Series and Threat Defense 7.4
8 min read
Read on for an in-depth discussion of our latest Cisco Secure Firewall announcement, including the new 4200 Series appliance, and 7.4 software features.
Maximize Security and Embrace Firewall-as-a-Service from Managed Security Service Providers
4 min read
For Cisco Partners—particularly Managed Service Security Providers (MSSPs)—there is a huge opportunity to help customers update/refresh their network infrastructure and network firewalls to keep up with modern infrastructure and use cases. And secure firewalls are a foundational component of multiple sales motions and sales opportunities.
Firepower API’s Allow an Integrated Security Architecture
3 min read
Join the Security Webinar Series: Discover the great advantage of using Firepower APIs to automate device deployments, policy updates, and security incident remediation without human intervention.
Network Security Efficacy in the Age of Pervasive TLS Encryption
6 min read
As encryption becomes increasingly pervasive, network security administrators can struggle to maintain an acceptable level of security efficacy.
Magyar Telekom enhances security and quality-of-life for all
1 min read
European telecommunications provider Magyar Telekom improves its cyber-risk posture, increases efficiency and resource utilization, and simplifies management with Cisco’s unified security platform.
Cisco and IBM: Solving Customer Challenges through the Power of Partnerships
3 min read
Cisco and IBM Security are working together to provide our joint customers an in-depth, end-to-end defense strategy while simplifying their vendor relationships.
A Bridge to the Future of the Firewall
2 min read
With Cisco Defense Orchestrator, organizations can seamlessly harmonize security policies across tens or thousands of devices – including ASA, and in the very near future, FTD and Meraki MX.
To the Depth of TLS Invisibility and Beyond
3 min read
Encrypted traffic is changing the threat landscape...Encryption technology enables greater privacy and security to communicate and transact business online. Mobile, cloud, and web applications rely on well-implemented encryption mechanisms, using keys and certificates, to ensure confidentiality and trust.
1