Cisco Security User Protection - Microsoft Ignite 2023
16:48
Cisco User Protection: Cisco First Access, Cisco Duo, Cisco Secure Access, Email Threat Defense, Remote Browser Isolation, Malware Analytics
Related Videos
For "Email"
-
Play video Sender Domain Reputation Enhancements
Sender Domain Reputation Enhancements
A brief overview of enhancements to sender domain reputation and maturity, in Cisco Secure Email.
2:32
-
Play video Cisco Secure Email: Simplified, Intensified, Maximized
Cisco Secure Email: Simplified, Intensified, Maximized
Take a new look at Cisco Secure Email. We’ve radically simplified the way email is protected and how companies choose to migrate to the cloud. Watch the webinar replay now.
56:23
-
Play video Webex Contact Center Setting Up Email Entry Points, Queues and their Routing Strategies
Webex Contact Center Setting Up Email Entry Points, Queues and their Routing Strategies
Multimedia Email Entry Points are the initial landing places for Email interactions. Each Email Entry Point is to be tied to an external email account in order to send and receive emails.
2:37
-
Play video Cisco Secure Email makes your migration to the cloud easy
Cisco Secure Email makes your migration to the cloud easy
Explore the many ways that Cisco Secure Email makes your migration to the cloud easy and safe.
1:41
-
Play video Feature Spotlight: Search and Remediation
Feature Spotlight: Search and Remediation
Technical Marketing Engineer Christian Clasen demonstrates how Cloud Mailbox’s Search and Manual Remediation capabilities augment native Microsoft features to save analysts and investigators time when working with email threats.
2:45
-
Play video Cisco Secure Awareness Training Integration with Secure Email, 14.0 Release
Cisco Secure Awareness Training Integration with Secure Email, 14.0 Release
Cisco Secure Awareness Training now provides reports of repeat clickers directly to the Secure Email solution. Helps to further mitigate potential security threat and better protect the most vulnerable users via more aggressive policy configuration.
5:13