Announcing Cisco Nexus Dashboard Open Ecosystem with Splunk
Cisco Nexus Dashboard offers a rich suite of services for third-party developers to build custom applications and integrations with open APIs and platform services. We are proud to announce the availability of two new, out-of-the-box integrations with our strategic technology partner, Splunk: Cisco Cloud Network Insights App and Add-on for Splunk Enterprise.
Pinpoint Your SolarWinds Exposure with Cisco Endpoint Security Analytics
With Cisco Endpoint Security Analytics (CESA) in your toolkit, you can quickly assess your own exposure and address endpoint visibility gaps left behind by traditional EDR/EPP solutions and network security analytics platforms.
How to Monitor VPN Split Tunneling and Remote Endpoints with Existing Infrastructure
Learn how Cisco Endpoint Security Analytics (CESA) helps alleviate VPN bandwidth constraints while improving endpoint security for remote work deployments.
Cisco and Splunk Technology Innovations Showcase at Splunk .Conf19, Vegas, 2019
Cisco-Splunk partnership is growing at a terrific pace. Recently, Splunk showcased Cisco as one of its top 4 partners. As a testimony to our growing momentum, Cisco is a Peta sponsor this year at Splunk .conf19, Venetian sands, Las Vegas, Oct 21-25.
Using CESA to Solve Endpoint Blindness for a World Class InfoSec Team
Cisco Endpoint Security Analytics (CESA) Built on Splunk brings together the endpoint behavioral visibility of Cisco’s AnyConnect Network Visibility Module (NVM) and the data transformation power of Splunk analytics.
Find What Your Endpoint Anti-Malware is Missing with CESA Built on Splunk
Splunk’s analytics-driven security solutions are a perfect complement to Cisco Security. This partnership has generated CESA Built on Splunk, which is a solution unlike anything available in the industry.
A Cisco & Splunk Security Integration Everyone Should Be Using
Shining a light on an integration that is among the most powerful of all our Splunk integrations – Cisco AnyConnect Network Visibility Module and its associated Splunk app.
It’s Time to Turn Your Access Control Perimeter into a Threat Control Perimeter
Is your security ‘Game Plan’ reactive or proactive? Firms need to up their offensive game and strategy to evolve network perimeter security from just access control to effective threat control.