Cisco XDR Detection Analytics and Gen AI
32:35
In this session, our experts unpack the sophisticated mechanisms behind Cisco XDR's ability to swiftly detect and correlate threats.
Related Videos
In Security
-
Play video Cisco Hybrid Mesh Firewall - Hypershield
Cisco Hybrid Mesh Firewall - Hypershield
Protect your applications wherever they live This highly distributed security fabric with unified management is optimized for zero-trust segmentation and application protection in data center, cloud, campus, and IoT environments.
1:57
-
Play video Unlock Advanced Protection: Migrate from Cisco Umbrella to Cisco Secure Access
Unlock Advanced Protection: Migrate from Cisco Umbrella to Cisco Secure Access
Watch this video for a breakdown of the top 5 reasons why you should migrate to Secure Access.
14:26
-
Play video Cisco Secure Firewall 6100 Series Overview
Cisco Secure Firewall 6100 Series Overview
The Cisco Secure Firewall 6100 Series is an ultra-high-end series firewall that protects AI-ready data centers and telecom mobility infrastructure with exceptional performance density, line-rate advanced threat protection, and modular scalability.
1:14
-
Play video Cisco Secure Firewall 200 Series Overview
Cisco Secure Firewall 200 Series Overview
The Cisco Secure Firewall 200 Series combines advanced NGFW with SD-WAN, delivering high-security branches with 3x better price-performance than similar firewalls.
1:05
-
Play video Birla Opus Paints - Connected Factories, Smarter Paint
Birla Opus Paints - Connected Factories, Smarter Paint
Birla Opus Paints built six new factories with one digital backbone, achieving speed, security, and resilience through Cisco-powered connected operations.
1:47
-
Play video Universal ZTNA from Cisco: Zero Friction. Zero Imposters. Zero Downtime.
Universal ZTNA from Cisco: Zero Friction. Zero Imposters. Zero Downtime.
Today, zero trust is the new normal. You get the least access to get the job done; nothing more. It sounds easy, but it’s not. Users and things are everywhere. Accessing sensitive assets, on any device, from anywhere. But so are attackers.
1:40