Moving to Cisco Secure Access: Cisco Umbrella DNS Migration Tutorial
12:22
Watch this brief video for a step-by-step guide for how to migrate from Cisco Umbrella DNS to Cisco Secure Access - DNS Defense using the automated upgrade manager.
Related Videos
In Security
-
Play video Peco Foods Goes Zero Trust: Modern Security with Cisco SASE
Peco Foods Goes Zero Trust: Modern Security with Cisco SASE
Peco Foods partnered with Cisco to modernize security by replacing legacy systems with a secure access service edge (SASE) framework. The company's goals are to unify networking and security, enable zero trust and streamline management.
2:55
-
Play video Securing the Skies: How Wipro Safegaurds a Leading Airline
Securing the Skies: How Wipro Safegaurds a Leading Airline
Watch this aviation success story video on how Wipro, Cisco Secure Access and Google Chrome Enterprise Premium work together to deliver a secure way to access private applications from anywhere.
2:36
-
Play video Cisco AI Defense Integrates with NVIDIA Enterprise AI Software to Deliver Robust Cybersecurity for AI Applications Using NVIDIA NeMo Guardrails
Cisco AI Defense Integrates with NVIDIA Enterprise AI Software to Deliver Robust Cybersecurity for AI Applications Using NVIDIA NeMo Guardrails
See Cisco AI Defense in action with NVIDIA NeMo Guardrails, delivering real-time protection for AI applications.
3:51
-
Play video Moving to Cisco Secure Access: Cisco Umbrella SIG Migration Tutorial
Moving to Cisco Secure Access: Cisco Umbrella SIG Migration Tutorial
Watch this video for a step-by-step guide of how to migrate from Cisco Umbrella SIG to Cisco Secure Access - Secure Internet Access (SIA) leveraging the automated upgrade manager.
8:28
-
Play video Universal ZTNA from Cisco: Zero Friction. Zero Imposters. Zero Downtime.
Universal ZTNA from Cisco: Zero Friction. Zero Imposters. Zero Downtime.
Today, zero trust is the new normal. You get the least access to get the job done; nothing more. It sounds easy, but it’s not. Users and things are everywhere. Accessing sensitive assets, on any device, from anywhere. But so are attackers.
1:40
-
Play video Workflows | Meraki Wireless SSID Configuration with ISE
Workflows | Meraki Wireless SSID Configuration with ISE
Discover how AI Assistant uses Workflows to automate Meraki Wireless SSID configuration with 802.1X RADIUS authentication, streamlining NAC deployment with Cisco ISE for secure wireless access.
8:22