Cisco Cyber Vision Overview
21:02
This video offers a detailed overview of the Cyber Vision architecture and demonstrates most of its features.
Related Videos
In Security
-
Play video Policy Assistant and Experience Insights with Cisco Secure Access
Policy Assistant and Experience Insights with Cisco Secure Access
This presentation by Fay Lee and Justin Murphy, focuses on Cisco Secure Access and the integration of Generative AI (Gen AI) and ThousandEyes technology for enhancing security and user experience.
56:07
-
Play video Talos March 2024 APJC Update: The Evolution of GhostSec (Social)
Talos March 2024 APJC Update: The Evolution of GhostSec (Social)
In this video Cisco Talos researcher Chetan Raghuprasad discusses a recent surge in activity from the hacker group GhostSec, and how they have evolved their tooling and affiliate program.
0:44
-
Play video Cisco Cyber Vision Deployment - Episode 1 - Center OVA Deployment - 4.2.3
Cisco Cyber Vision Deployment - Episode 1 - Center OVA Deployment - 4.2.3
In part one of our Cisco Cyber Vision deployment series, we present an overview of the Cisco Cyber Vision Center and walk through the deployment process of the Cyber Vision Center ova into a VMWare ESXi environment.
10:21
-
Play video Cisco Cyber Vision Deployment - Episode 2 - Cyber Vision Sensor - Catalyst IE3400 Deployment
Cisco Cyber Vision Deployment - Episode 2 - Cyber Vision Sensor - Catalyst IE3400 Deployment
In part two of our Cisco Cyber Vision deployment series, we present an overview of the Cisco Cyber Vision Sensor and demo the deployment of the Cyber Vision Sensor using the Sensor Management Extension onto the Cisco Catalyst IE3400 series switches.
19:59
-
Play video Risk Based Endpoint Security with Cisco Vulnerability Management and Cisco Secure Endpoint
Risk Based Endpoint Security with Cisco Vulnerability Management and Cisco Secure Endpoint
Cisco Vulnerability Management integrates with Cisco Secure Endpoint to ingest endpoint vulnerability data, enabling users to detect, assess, prioritize, and manage endpoint vulnerabilities with a data science-driven approach.
1:33
-
Play video Getting into cybersecurity - what to consider, trainings, certifications, and how to grow your skillset
Getting into cybersecurity - what to consider, trainings, certifications, and how to grow your skillset
Join Hazel and Martin for February's monthly Talos update. Getting into cybersecurity - what to consider, trainings, certifications, and how to grow your skillset
10:05