threat detection
A compelling story
6 min read
Ways of structuring the presentation of machine-generated alerts, so that each alert offers a cohesive and compelling narrative.
Boosting your XDR Potential with Device Insights and Kenna Integrations
2 min read
We have been busy this past year, with our acquisition of Kenna Security and our recent innovations around device insights – all helping to expand and strengthen SecureX and our extended detection and response (XDR) capabilities.
SecureX and Secure Firewall: Integration and Automation to Simplify Security
3 min read
New integrations between SecureX and Secure Firewall streamline processes and increase automation to simplify your security.
Cisco Cloud Native Security – Part 4: Security Analytics and Threat Detection
8 min read
Learn how to add visibility, threat detection, security analytics, and alerting inside of your Kubernetes cluster using Cisco Secure Cloud Analytics.
Intelligent alert management
4 min read
We all know what alert fatigue is. In this blog, we explore how we tackle it. How does our Alert Fusion system work?
The 5 dimensions of security resilience
4 min read
Recent events have made security resilience even more critical. Learn how your business can embrace resilience to navigate uncertain times and emerge stronger.
Cisco Secure Endpoint goes Pro
3 min read
Discover the new Secure Endpoint Pro, and learn how it combines all the protections of Cisco Secure Endpoint with around the clock, Cisco-delivered security operations to drastically reduce the mean time to detect and respond to threats.
Creating a Path to Successful Security Hygiene
1 min read
Read the “Security Hygiene and Posture Management” eBook to learn how you can better identify cyber-risks and defense gaps to improve your overall security best practices.
Relevant and Extended Detection with SecureX, Part Four: Secure Cloud Analytics Detections
5 min read
Building upon the concept of a behaviour-based detections, this piece discusses detections from Cisco Secure Cloud Analytics, when & how to promote them to SecureX as incidents, and how to leverage and extend the detections in SecureX.
1