-
Cisco Insider Advocates with a passion for Cybersecurity
Are you a cybersecurity professional? Join Cisco Insider Advocates today to network with other passionate security customers and have access to our exclusive Cybersecurity Channel. Join today https://insideradvocates.cisco.com/join/video
1:30
-
Cisco FSO Business Risk Observability Demo
Enhanced Cisco FSO offer with Business Risk Observability and new levels of security intelligence capabilities where business context is brought into application security for expanded threat visibility and intelligent business risk prioritization.
5:30
-
Cisco Cyber Vision Overview
This video offers a detailed overview of the Cyber Vision architecture and demonstrates most of its features.
21:02
-
TLS 1.3: What Have We Learned About Implementation and Network Monitoring
In this video, Enterprise Management Associates and Cisco discuss the adoption of the TLS 1.3 standard, what business leaders have learned throughout the implementation process, and the benefits they gained through adoption.
0:59
-
Cisco FSO Platform
Cisco FSO Platform is open, extensible, built with OpenTelemetry, anchored on MELT (metrics, events, logs and traces) and enabling extensibility from queries up to data models with a composable UI framework.
1:19
-
Cisco Secure Firewall 3100
This session showcases hardware and software innovations around Cisco Secure Firewall 3100 Series appliances.
29:18
-
Cisco Secure Firewall: Strength in Unity
There is strength in unity, and when it comes to protecting the integrity of your organization, the same holds true. You need multiple security tools working together to protect your network, workforce, and workloads.
1:40
-
Cisco Zero Trust in Action: Secure user access to applications
This product demo shows a day in the life of a user gaining secure remote access to applications by continuously verifying user and device trust using Cisco zero trust technologies such as Duo and Umbrella.
7:40
-
Zero Trust in Action: Automate and orchestrate security workflows
This product demo shows how Secure Workload together with Secure Firewall allows for quick detection and response to a compromised AWS server via the automated and orchestrated workflows in SecureX. Rapid response is key for zero trust security.
5:59
-
Cisco Zero Trust in Action: Unify access policy across networks and clouds
This product demo shows how ISE uses Security Group Tags (SGTs) to establish trust and enforce trust-based access based on user type (employee vs. contractor) and then integrates this with the Secure Workload access policy for zero trust security.
7:42
-
Cisco Zero Trust in Action: Apply micro-segmentation at scale
This product demo shows how Secure Workload uses vulnerability data to enforce trusted access via micro-segmentation policies. Quite simply, if an app is vulnerable, the policy engine will automatically limit access to it until it can be remediated.
5:36
-
Webinar: Cisco Secure Endpoint Provides Relentless Breach Prevention
Cisco Secure Endpoint experts discuss protecting hybrid workers, breach prevention, staying resilient against threats, and Cisco’s performance in recent real-world testing.
57:26
- Load More