FMC & Splunk Integration (SIEM) using Splunk App
1:43
This video demonstrates how to integrate FMC & Splunk (SIEM) using Splunk App.
Related Videos
In Featured Video
-
Play video How to collect all logs for EPNM
How to collect all logs for EPNM
This video describes the steps to collect all logs for EPNM troubleshooting using the show tech-support file <file name> command. Tags: EPNM, logs.
2:10
-
Play video Unified management with Security Cloud Control
Unified management with Security Cloud Control
Hear Cisco Security CTO, Craig Connors explain how Security Cloud Control delivers unified management for Hybrid Mesh Firewall
2:23
-
Play video DC Segmentation with VXLAN Group Policy Object (GPO) On-Demand Webinar
DC Segmentation with VXLAN Group Policy Object (GPO) On-Demand Webinar
Join this webinar to discover how you can implement segmentation on VXLAN EVPN fabrics with Nexus and the Group Policy Object (GPO) capabilities. Live demo included
1:34:26
-
Play video Back to Basics GenAI Webinar Series: What to do with data
Back to Basics GenAI Webinar Series: What to do with data
Explore how data pipelines are essential for any AI-driven application, and discover the foundational elements of data management, from collection to transformation to highlight their impact on the accuracy and effectiveness of GenAI Apps
58:29
-
Play video Making your big security challenges manageable, with Cisco XDR and Meraki MX
Making your big security challenges manageable, with Cisco XDR and Meraki MX
The native integration of Meraki MX with Cisco XDR makes it easy to correlate netflow data with telemetry from email, endpoints, servers, and cloud workloads to deliver network-led insights in prioritizing developing threats across your environment.
1:11
-
Play video Cybersecurity Threats Exposed: Real-World Attacks and Cisco Defenses
Cybersecurity Threats Exposed: Real-World Attacks and Cisco Defenses
Showcase of progression from an initial breach to full exploitation. Using real-world scenarios, illustration of the methods attackers use to infiltrate systems, exfiltrate data, and disrupt operations.
1:28:18