Embedded cloud-native security with AWS
55:58
Check out our webinar to learn how AWS and Cisco are working together to help customers improve their cloud security.
Related Videos
In Network Protection
-
Play video Cisco Secure Cloud Analytics Overview
Cisco Secure Cloud Analytics Overview
See how you can achieve a comprehensive approach to gaining visibility and telemetry for actionable analytics across your hybrid infrastructure to detect threats.
2:15
-
Play video Cisco Identity Services Engine (ISE) leaps into infrastructure as code with ISE 3.1 from the cloud
Cisco Identity Services Engine (ISE) leaps into infrastructure as code with ISE 3.1 from the cloud
See how provisioning ISE from the cloud enables rapid deployment of network accesses and control services to anywhere, automatically extending policy to build zero trust within the workplace without slowing down the business.
1:43
-
Play video Scheduling protection from Secure Network Analytics with Umbrella in SecureX
Scheduling protection from Secure Network Analytics with Umbrella in SecureX
In this video we show how automated workflows in SecureX bridge global threat alerts based on Cisco Talos threat intelligence in Secure Network Analytics to block malicious domains with Cisco Umbrella. SecureX, it’s already there, just turn it on.
4:04
-
Play video Cisco Stealthwatch for Multicloud Security
Cisco Stealthwatch for Multicloud Security
Cisco Stealthwatch can ingest native logs from AWS, Google Cloud Platform, Microsoft Azure, and the on-premises network. This gives you a unified view of your entire network to detect and investigate threats wherever they are.
1:39
-
Play video What is dynamic entity modeling with Cisco Stealthwatch Cloud?
What is dynamic entity modeling with Cisco Stealthwatch Cloud?
Cisco Stealthwatch Cloud offers a Network Security-as-a-Service solution that uses dynamic entity modeling to detect threat activity. See how entity modeling works in this short video or learn more at https://cisco.com/go/stealthwatch-cloud
3:54
-
Play video Detecting and isolating malicious devices and flows with Secure Network Analytics and Secure Endpoint to automate detection and response and achieve XDR outcomes.
Detecting and isolating malicious devices and flows with Secure Network Analytics and Secure Endpoint to automate detection and response and achieve XDR outcomes.
In this video Hanna Jabbour; Secure Technical Marketing Engineer, gives an overview of how to extend threat detection in Secure Network Analytics to automate a Secure Endpoint response to isolate threats and quarantine rogue entities. SecureX, it’s a
4:46