-
Cisco Zero Trust in Action: Secure user access to applications
This product demo shows a day in the life of a user gaining secure remote access to applications by continuously verifying user and device trust using Cisco zero trust technologies such as Duo and Umbrella.
7:40
-
Zero Trust in Action: Automate and orchestrate security workflows
This product demo shows how Secure Workload together with Secure Firewall allows for quick detection and response to a compromised AWS server via the automated and orchestrated workflows in SecureX. Rapid response is key for zero trust security.
5:59
-
Cisco Zero Trust in Action: Unify access policy across networks and clouds
This product demo shows how ISE uses Security Group Tags (SGTs) to establish trust and enforce trust-based access based on user type (employee vs. contractor) and then integrates this with the Secure Workload access policy for zero trust security.
7:42
-
Cisco Zero Trust in Action: Apply micro-segmentation at scale
This product demo shows how Secure Workload uses vulnerability data to enforce trusted access via micro-segmentation policies. Quite simply, if an app is vulnerable, the policy engine will automatically limit access to it until it can be remediated.
5:36
-
What is security resilience?
Security resilience is about planning for the unexpected so you can protect the integrity of every aspect of your business. Learn how Cisco enables you to build a strong blueprint for the future at cisco.com/go/security-resilience.
1:42
-
Insider Series Podcast: Cloud-Managed Nexus Innovations and 400G Advancements (Audio Only)
Learn how Cisco Nexus Cloud gives organizations a new way of deploying, managing, and operating their Cisco Nexus networks from the cloud.
23:14
-
What is Security Resilience?
Security resilience is about planning for the unexpected so you can protect the integrity of every aspect of your business. Learn how Cisco enables you to build a strong blueprint for the future at cisco.com/go/security-resilience.
1:42
-
Mitigate Risk to Recover Faster: Inside Cisco Talos Threat Hunters
Timing is everything when it comes to threat detection and response. See how Cisco Talos Threat Hunters work around the clock to detect threats like ransomware and help businesses recover.
2:08
-
How Experts Defend Against Ransomware: Inside Cisco Talos Threat Hunters
Attackers and the threats they pose are becoming more sophisticated by the day and defending against them is no easy task. Cisco Talos Threat Hunters are up for the challenge.
2:07
-
The Future of Cloud is the Network
Cisco's Richard Licon and Futurum Research dive into the major trends, drivers, and main challenges of the swiftly evolving cloud networking market.
29:27
-
Speed Matters for Cisco Talos Threat Hunters
When it comes to cybersecurity threats, it’s a matter of when, not if. But detecting breaches faster mitigates risk, which is critical for maintaining resilience.
0:15
-
Cisco Talos Threat Hunters are Always On
Attackers are relentless, but so are Talos Threat Hunters. See how they’re working around the clock to defend against ever-evolving threats.
0:15
- Load More