Cisco Identity Services Engine (ISE) leaps into infrastructure as code with ISE 3.1 from the cloud
1:43
See how provisioning ISE from the cloud enables rapid deployment of network accesses and control services to anywhere, automatically extending policy to build zero trust within the workplace without slowing down the business.
Related Videos
In Network Protection
-
Play video Snort 3 and Me: An introduction and overview to Snort 3
Snort 3 and Me: An introduction and overview to Snort 3
In the first webinar in this new series on Snort 3 and Cisco firewalls, see a quick overview of Snort 3 and introduces users to the upgrade process. For more on Snort 3: https://snort.org/snort3
32:18
-
Play video Create forensic incident investigation casebooks with Secure Network Analytics that unify retrospective insights with Secure Endpoint and enable rapid threat hunting
Create forensic incident investigation casebooks with Secure Network Analytics that unify retrospective insights with Secure Endpoint and enable rapid threat hunting
In this video Hanna Jabbour; Secure Technical Marketing Engineer, shows how SecureX unifies retrospective insights with Secure Endpoint and Secure Network Analytics to enable rapid threat hunting. SecureX, it’s already there, just turn it on.
4:45
-
Play video Cisco Stealthwatch for Multicloud Security
Cisco Stealthwatch for Multicloud Security
Cisco Stealthwatch can ingest native logs from AWS, Google Cloud Platform, Microsoft Azure, and the on-premises network. This gives you a unified view of your entire network to detect and investigate threats wherever they are.
1:39
-
Play video What is dynamic entity modeling with Cisco Stealthwatch Cloud?
What is dynamic entity modeling with Cisco Stealthwatch Cloud?
Cisco Stealthwatch Cloud offers a Network Security-as-a-Service solution that uses dynamic entity modeling to detect threat activity. See how entity modeling works in this short video or learn more at https://cisco.com/go/stealthwatch-cloud
3:54
-
Play video Secure Network Analytics Product Demonstration
Secure Network Analytics Product Demonstration
This demo video provides an overview of what end-to-end detection and response looks like within the Secure Network Analytics. It also showcases new capabilities such as automated response and Secure Network Analytics' integration with SecureX.
8:41
-
Play video Detecting and isolating malicious devices and flows with Secure Network Analytics and Secure Endpoint to automate detection and response and achieve XDR outcomes.
Detecting and isolating malicious devices and flows with Secure Network Analytics and Secure Endpoint to automate detection and response and achieve XDR outcomes.
In this video Hanna Jabbour; Secure Technical Marketing Engineer, gives an overview of how to extend threat detection in Secure Network Analytics to automate a Secure Endpoint response to isolate threats and quarantine rogue entities. SecureX, it’s a
4:46