Deploy an FTDv on Azure
3:48
This video describes the steps on how to Deploy an FTDv on Azure Tags: firepower, security
Related Videos
In Government
-
Play video Interview with World Wide Technology about Cisco Secure AI Factory with NVIDIA
Interview with World Wide Technology about Cisco Secure AI Factory with NVIDIA
Cisco’s Cassie Roach talks with Terry Frost and Nathan Litz of World Wide Technology about why they are making an investment in the Cisco Secure AI Factory with NVIDIA.
6:51
-
Play video Santobono Hospital - a CDA use case
Santobono Hospital - a CDA use case
the video showcases the impact of the Country Digital Acceleration use case at the hospital Santobono Posillipo, Naples, Italy
0:59
-
Play video Cisco Cloud + AI Bytes: Data Center Networking Innovations at Cisco Live EMEA
Cisco Cloud + AI Bytes: Data Center Networking Innovations at Cisco Live EMEA
Cisco’s Cassie Roach and Sai Natarajan discuss how Cisco’s Silicon One G300-powered Nexus platforms and new pluggable optics give customers and partners a secure, validated, platform-based advantage to managing GPUs in the agentic AI era.
10:08
-
Play video Digitaliani: 10years of Country Digital Acceleration Program in Italy
Digitaliani: 10years of Country Digital Acceleration Program in Italy
This video intend to promote the impact that CDA had in Italy over the last decade
2:26
-
Play video Interview with NTT Data about Cisco Secure AI Factory with NVIDIA (Part I)
Interview with NTT Data about Cisco Secure AI Factory with NVIDIA (Part I)
Cisco’s Cassie Roach talks with Geoffrey Heritier and Samantha Kouevi of NTT DATA about why they are making an investment in the Cisco Secure AI Factory with NVIDIA.
4:38
-
Play video Lessons from the agentic frontier: How the SOC is winning in the AI era | RSAC 2026 Splunk Keynote
Lessons from the agentic frontier: How the SOC is winning in the AI era | RSAC 2026 Splunk Keynote
John Morgan, SVP and GM of Security at Splunk, and Fred Frey, Director of Al Engineering for Security at Splunk shared practical insights on building a human-led, machine-accelerated Security Operations Center (SOC).
22:14