Multi-Factor Authentication (MFA)
Context is Everything When it Comes to Securing Application Access
4 min read
Cisco SecureX connects access controls across the workforce, workload, and workplace to help democratize our comprehensive zero-trust approach by removing the barriers between the teams responsible for each control.
Collaboration Without Compromise: A Security-First Approach to Remote Working
3 min read
With these guiding principles in mind Cisco Webex is committed to helping customers address their remote workplace productivity, connectivity, privacy and security in these three distinct ways.
Ingredients Needed to Manage Network Tribbles
2 min read
Cybersecurity – the final frontier, these are the trials and tribulations that network admins face on an ongoing basis. Network admins are like Starfleet captains navigating unknown galaxies as the infrastructure of organizations become more complex.
Why Collaboration IT Administrators Trust Webex
3 min read
Here at Cisco, we have built our collaboration strategy on security, from design to development to deployment and beyond.
Cybersecurity Roles and Responsibilities: Private Sector Perspective
2 min read
Last week, I had the pleasure of briefing members of the U.S. Senate’s Homeland Security and Government Affairs Committee to provide Cisco’s perspective on the roles for the private sector...
The One-Two Punch of User and Device Trust
2 min read
The combination of user trust plus device trust is the one-two punch to minimize risk and ensure your applications are only accessible by devices you allow.
Announcing Duo’s MFA for Cisco’s Firepower Threat Defense (FTD)
1 min read
We recently extended our ability to secure Cisco offerings with the beta availability of Duo's MFA for AnyConnect running on Cisco’s FirePower Threat Defense (FTD). You can learn more about Cisco FTD here. Previously, you were only able to secure your AnyConnect VPN client running on Adaptive Security Appliance (ASA) products.
Better Security with Trusted Access
3 min read
In 2019, a better security posture begins with continuous threat detection and continuously verifying trust. At Cisco, we call our trust-centric approach to security Cisco Trusted Access.
The Zero Trust Games are here!
2 min read
Every year at RSA Conference, a pitched battle ensues for the heart and soul of the security practitioner. Or at least for the mind: there’s the word cloud of topics that show up most often in the CFP submissions, but there are more slogans, phrases and concepts that meet in the expo hall to fight for supremacy. Zero Trust is the newest kid on the block and will probably be the one with the biggest variety of gladiators in the ring.