Showing posts with label Cisco Secure Endpoint. Show all posts
Showing posts with label Cisco Secure Endpoint. Show all posts

Saturday, 30 September 2023

When it Comes to Compliance Requirements – Topology Matters!

When I look at the evolution of network security and how IT and security practitioners have protected the network for the last 30 years, I can’t help but notice how traditional network security enforcement points (insert your favorite firewall here) are still used to secure networks and workloads....

Saturday, 29 July 2023

Provide State-of-the-Art Endpoint Protection as a Managed Service

Cisco Secure Endpoint (formerly AMP for Endpoints) provides comprehensive, cloud-based security for endpoint detection and response (EDR). This unique solution contains several detection engines powered by Cisco Talos threat intelligence to prevent, detect, respond, and block cyber threats before your systems are compromised. The capabilities of Cisco Secure...

Thursday, 22 June 2023

The Value of SOC2 and ISO27001 in Enhancing Customer Trust

In an era of ever-evolving cybersecurity threats, a strong security posture for your cloud-based applications is paramount. Certifications such as SOC2 and ISO27001 represent an international benchmark that demonstrate a product’s robustness in security, service resiliency, and sound data management practices. Recently, our product, Secure Email Threat Defense,...

Saturday, 10 December 2022

Preparing for 2023 and what lies in store for Endpoint Security

A new year is almost upon us and as we look back on our accomplishments in 2022, we also look forward to helping our customers become more security resilient and be better prepared for 2023. As part of this forward-looking process, and with the help of Gartner Peer...

Sunday, 31 July 2022

More than a VPN: Announcing Cisco Secure Client (formerly AnyConnect)

We’re excited to announce Cisco Secure Client, formerly AnyConnect, as the new version of one of the most widely deployed security agents. As the unified security agent for Cisco Secure, it addresses common operational use cases applicable to Cisco Secure endpoint agents. Those who install Secure Client’s next-generation...

Tuesday, 12 April 2022

Announcing Risk-Based Endpoint Security with Cisco Secure Endpoint and Kenna Security

With a tidal wave of vulnerabilities out there and brand-new vulnerabilities coming out daily, security teams have a lot to handle. Addressing every single vulnerability is nearly impossible and prioritizing them is no easy task either since it’s difficult to effectively focus on the small number of vulnerabilities...

Tuesday, 5 April 2022

Intelligent alert management

The challengeIn cyber security, we all know what alert fatigue is, and we know there is no silver bullet to get out of it. In our previous incarnation, our product was guilty as well. Who wants to go through 20,000 alerts one by one? And this was just...

Sunday, 13 March 2022

Introducing the new ‘Defending Against Critical Threats’ report

Today, we’re pleased to launch our annual Defending Against Critical Threats report. Inside, we cover the most significant vulnerabilities and incidents of 2021, with expert analysis, insights and predictions from our security and threat intelligence teams across Cisco Talos, Duo Security, Kenna Security, and Cisco Umbrella.It’s clear that...

Saturday, 4 December 2021

Relevant and Extended Detection with SecureX

Al Huger spoke about Cisco’s vision of Extended Detection and Response (XDR); specifically covering the breadth of definitions in the industry and clarifying Cisco’s definition of XDR:“A unified security incident detection and response platform that automatically collects and correlates data from multiple proprietary security components.”He also detailed the...

Thursday, 12 August 2021

Threat Protection: The REvil Ransomware

The REvil ransomware family has been in the news due to its involvement in high-profile incidents, such as the JBS cyberattack and the Kaseya supply chain attack. Yet this threat carries a much more storied history, with varying functionality from one campaign to the next.The threat actors behind...