network security

November 19, 2020

DEVELOPER

Learn How to Secure Your Cloud-native Applications and Infrastructure – Part 3, Cisco Stealthwatch Cloud

Learn how Cisco Stealthwatch Cloud can give you visibility into your public cloud resources, and detect threats in your application environment.

November 13, 2020

SECURITY

Under Analytics

As more organizations turn to SaaS options for monitoring and managing their network security, it’s time to revise how we look at the network being “under management.”

November 11, 2020

DEVELOPER

Get to Know Cisco SecureX

Learn how SecureX uses APIs to give security operations teams unprecedented simplicity, visibility, and efficiency. Live webinar, November 17th.

November 2, 2020

DATA CENTER

Securing Applications and Infrastructure Beyond the Data Center

Applications and infrastructure have become highly dynamic and distributed. While this gives IT professionals, DevOps specialists and business teams tremendous flexibility and agility, it also expands an organization’s attack surface. Learn how Cisco customers are securing every layer of the network.

October 8, 2020

DEVELOPER

Learn How to Secure Your Cloud-native Applications and Infrastructure – Part 1 of 5

Learn how to stage the infrastructure, modify and deploy the application, and instrument the security products into the environment. Register for the October 27 webinar on Cisco Application First Security.

October 1, 2020

DEVELOPER

Know Who Is on Your Network and What They Are Doing

Cisco Stealthwatch has new updates, and learning labs to help you get started with comprehensive network traffic security, visibility, and analytics.

June 24, 2020

DEVELOPER

Secure Your Cisco DNA Center API Authentication with Vault

What's the best way to secure your API keys? Get Kareem's quick and easy guide on how to integrate Vault within your code.

May 21, 2020

SECURITY

Your Network Is Rapidly Expanding – How do you secure it?

Today’s security teams have to mind various areas of their infrastructure, remote users and endpoints, and applications running everywhere in order to remain secure. How do you do it all?