Security Operations Center (SOC)
Moving the Security Poverty Line: Why We Need a Collaborative Approach to Cybersecurity
3 min read
Learn how a collective approach to security will help secure individual systems and strengthen security postures across the broader digital landscape.
Black Hat Asia 2023 NOC: XDR (eXtended Detection and Response) in Action
11 min read
For Black Hat Asia 2023, Cisco Secure was the official DNS and Malware Analysis Provider.
Black Hat Asia 2023 NOC: Connecting Singapore
17 min read
Cisco Meraki is the Official Wired and Wireless Network Platform and Mobile Device Management Provider for Black Hat Asia.
Simplify Your Security Operations with Cisco XDR, Launching at RSAC
4 min read
Cisco XDR simplifies security operations, allowing security teams to elevate productivity and stay resilient against the most sophisticated threats.
Tour the RSA Conference 2023 Security Operations Center
1 min read
Register now for your free tour at the RSA Conference Security Operations Center (SOC). Read the blog to learn more!
Greater Monitoring and Visibility for your Security Success
2 min read
Today’s hybrid work environment requires enterprises to adopt a new approach to managing security operations. Cisco has collaborated with Splunk to help enterprises transform security operations with greater monitoring and visibility.
Black Hat Europe 2022 NOC: When planning meets execution
11 min read
Cisco is a Premium Partner of the Black Hat NOC, and is the Official Wired & Wireless Network Equipment, Mobile Device Management, DNS (Domain Name Service) and Malware Analysis Provider.
Black Hat Europe 2022 NOC: The SOC Inside the NOC
11 min read
Cisco is a Premium Partner of the Black Hat NOC, and is the Official Wired & Wireless Network Equipment, Mobile Device Management, DNS (Domain Name Service) and Malware Analysis Provider.
RSA Conference® 2022 Security Operations Center Findings Report
1 min read
Download the RSA Conference 2022 SOC Findings Report to learn about unencrypted network traffic, DNS security, intrusion detection and other key security topics.