Cisco and AWS Team Up for Better Application Performance, Enhanced Security
Cisco's enhanced integration partnership with AWS will lead to cloud apps that perform better and more securely. We will make it more straightforward for you to deploy new apps on hybrid networks, to make apps more manageable using the Cisco network tools you already have, and to save your business money in the process.
Zero Trust – 5 Things You Need to Know
This blog discusses what zero trust really means, what are the key parts to Cisco’s Zero Trust solution, and how you can help customers achieve their security goals.
Our focus on security in an open collaboration world
It is our promise to work with each of our customers to provide them the most secure configuration and that is why we will only support third-party collaboration vendors who meet our security standards and who integrate with our products and services through our supported open APIs.
Manufacturing: Secure networks to cell/area zone
Strictly speaking, threats to manufacturers’ security isn’t a new phenomenon. For several years, factories have fallen prey to security breaches – experiencing everything from brief production disruptions to significant business impacts. Known incidents in 2017 cost manufacturers more than $10 billion in reported losses. Not surprisingly, security has emerged as a board-level concern for nearly […]
New research: Are you really ready for today’s security threats?
Your business invests in all the latest security technologies. You run training. You meet your compliance requirements for scans and tests. You can stand up in front of the board and say with confidence “we’ve got this covered.” But are you as prepared as you think? New research from ESG sheds new light on threat […]
Collaborating at Cisco
Chloe shares how she is collaborating at Cisco with teams around the globe and how things that may create barriers like time zones are truly making them come together in getting the job done.
RFC 8573: Why Trust in Time Matters for Your Network
Your network may use timestamps from a completely untrusted time source within an IP network. RFC 8573 shows how to overcome this.