threat defense
Secure Email Threat Defense: Providing critical insight into business risk
2 min read
Discover the ways that Secure Email Threat Defense uses advanced threat capabilities to identify the intent of an attack and provide insight into business risk.
How can I help protect my company from phishing attacks?
3 min read
Discover the ways you can help your organization avoid becoming a target of Business Email Compromise, a particularly dangerous and costly form of phishing.
Cisco Recognized as a Leader in 2019 Gartner Magic Quadrant for Network Firewalls
3 min read
Gartner has named Cisco a Leader in the 2019 Magic Quadrant for Network Firewalls. This recognition is a tool partners can use when positioning Cisco Next-Generation Firewalls.
Attivo Networks ThreatDirect™ Deception in a Docker Container
3 min read
The Catalyst 9000 family of switches has an application hosting framework that can manage docker container applications that run on devices.
Simplifying Security for Cisco Customers with New Cisco ONE Advanced Security Suites
2 min read
Security is the single biggest concern for our customers, but cobbling together security products from dozens of vendors only makes security infrastructure complex and difficult to manage.
The Value of Collaboration in Weakening Attackers
2 min read
Today’s attackers deploy complex and clever threats that are difficult to combat with just one method of defense. In some cases, defenders must go beyond tools for detecting attacks and devise a different approach for obstructing our adversaries’ ability to operate. As detailed in the Cisco 2016 Annual Security Report...
Branch Direct Internet Access: is your branch office secure?
3 min read
With the recent launch of FirePower Threat Defense on Cisco 4000 Series Integrated Services Routers, I would like to spend some time talking about enterprise branch security and...
The Need To Solve for Time
4 min read
Ponemon Institute called 2014 the year of the “Mega Breaches,” which will be remembered for its series of mega security breaches and attacks. These “Mega Breaches” are perfect examples of what is commonly known as Advanced Persistent Threats (APTs). The Ponemon Institute survey asked, among many questions, “When was the breach discovered?” Surprisingly, the results […]
“Security Everywhere” – Enterprise Branch Security for Direct Internet Access
2 min read
Two weeks ago, a leading global medical device manufacturer came to Cisco for advice. In an effort to streamline IT operations and reduce operating costs, the customer had recently migrated...