Customer Case Study: Marriott and Cisco Security
2:08
Marriott uses Cisco Umbrella in a unique initiative that blocks access to online child sexual abuse materials (CSAM) at this major U.S. hotel chain.
Related Videos
In Security
-
Play video How USGA Stopped Weekly Firewall Crashes with Cisco Secure Firewall
How USGA Stopped Weekly Firewall Crashes with Cisco Secure Firewall
Find how the USGA uses Cisco Secure Firewall to protect critical applications, keep fans safe on the network, and ensure seamless access during some of the biggest moments in golf.
1:20
-
Play video Northumbria Healthcare NHS Foundation Trust
Northumbria Healthcare NHS Foundation Trust
Empowering Digital Transformation with Cisco Identity Services Engine (ISE)
4:08
-
Play video Secure Access, Seamless Experience: LTIMindtree Secures Remote Work at Scale
Secure Access, Seamless Experience: LTIMindtree Secures Remote Work at Scale
Watch how this leading global technology consulting company modernizes their zero trust to boost cyber resilience and improve user experience.
3:13
-
Play video Tergooi Medical Center (Tergooi MC) builds a future proofed workplace and the ideal digital healthcare environment together with Cisco and Avit Group
Tergooi Medical Center (Tergooi MC) builds a future proofed workplace and the ideal digital healthcare environment together with Cisco and Avit Group
The Tergooi MC network is built on Cisco CX switches and Software-Defined Access. It creates a secure, dynamic, and mobile-first work environment.
2:40
-
Play video Transforming Connectivity: Bush Brothers & Company
Transforming Connectivity: Bush Brothers & Company
Ron Grohman from Bush Brothers & Company shares how they leveraged advanced networking solutions to transform operations, reduce downtime, and enhance flexibility and security across their infrastructure.
2:34
-
Play video NFL Play of the Week - Week 14
NFL Play of the Week - Week 14
When the blitz is on, Cisco’s portfolio of integrated security solutions help the NFL stay protected from digital threats and malicious attackers.
0:30