If you’ve been to a security conference in the last year you’ve probably seen more than 20 different vendors all talking about endpoint security. Some might be talking about next generation anti-virus, endpoint detection and response, and even the
When organizations begin their search for an advanced, next-generation endpoint security solution to protect PCs, Macs, servers, and mobile devices, they have a lot of different vendors to choose from and a lot of questions. Can it prevent attacks
I was very excited to finally get a chance to cover Tetration, especially when I learned that Cisco IT wanted to weigh-in on their experience with the platform. As you know, IT isn’t prone to blindness by “shiny objects.” They’re interested in solving
Infrastructure is aging, networks are expanding, and more devices are connecting. The Cisco 2016 Midyear Cybersecurity Report finds that attackers are remaining active and undetected for weeks, months, or even longer by taking advantage of well-known
In June, we announced that Cisco was recognized by Infonetics Research as a Leader in the Policy Management scorecard, based on feedback from service provider customers, vendor market share, market share momentum, financials, brand recognition
Last week, we were thrilled to receive the news that Infonetics scored Cisco Policy Suite as a Leader in the Policy Management Scorecard. Cisco was one of only two leaders recognized by Infonetics in this space and was recognized for building “… up
Cisco Identity Services Engine (ISE) is commonly associated with use as a network access policy, BYOD and AAA platform. But to do its job in network policy, ISE collects a great breadth of telemetry about network users and devices. Whether a device is
Today’s enterprise is a highly dynamic, and hyper connected environment where IT plays a critical role in connecting the users, devices, resources and corporate IT systems. Today’s employees are also highly mobile in nature and do not necessarily have