Security Analytics and Cisco XDR
29:46
This session gives an overview of Cisco Secure Analytics and the newly introduced Cisco XDR.
Related Videos
In Cisco Live
-
Play video Compute Innovation with Cisco UCS X-Series
Compute Innovation with Cisco UCS X-Series
Join us to learn about the latest announcements & innovations with the Cisco UCS X-series platform including X-direct for Edge environments, the all new AMD compute blade, and our X-Fabric technology that brings the latest GPUs to power AI workloads.
31:05
-
Play video Transforming the Next-Gen Firewall with Cisco Meraki Secure SD-WAN
Transforming the Next-Gen Firewall with Cisco Meraki Secure SD-WAN
Join Cisco for an exclusive unveiling where the Meraki cloud's capabilities meet the latest next-gen MX firewall advancements.
24:27
-
Play video Cisco Catalyst SD-WAN for Industrial IoT Use Cases
Cisco Catalyst SD-WAN for Industrial IoT Use Cases
Watch this session to understand why Cisco is making the pivotal shift from traditional network management to Software-Defined Networking with SD-WAN for Industrial IoT customers.
27:52
-
Play video Cisco Unified Fabric Experience with Cisco Nexus Dashboard
Cisco Unified Fabric Experience with Cisco Nexus Dashboard
Tune into this session where Cisco dives into Cisco Nexus One Fabric. This innovative architecture is redefining the possibilities within software-defined networking (SDN), and they are going to guide you through its transformative features.
41:55
-
Play video Cisco Secure Connect and Client ZTNA with New SSE Engine powered by Cisco Secure Access
Cisco Secure Connect and Client ZTNA with New SSE Engine powered by Cisco Secure Access
In this session, learn how Cisco Zero Trust Network Architecture integrates with the larger Cisco SASE platform.
24:04
-
Play video Cisco Secure Firewall: Intelligent Security Powered by Talos
Cisco Secure Firewall: Intelligent Security Powered by Talos
In this presentation, Cisco dives into the ever-evolving role of the firewall and its enduring significance within the framework of a robust security strategy.
27:04