Customer Case Study: Marriott and Cisco Security
2:08
Marriott uses Cisco Umbrella in a unique initiative that blocks access to online child sexual abuse materials (CSAM) at this major U.S. hotel chain.
Related Videos
In Security
-
Play video Alex Attumalil, Under Armour
Alex Attumalil, Under Armour
Pam Lindemoen chats with Alex Attumalil about his journey to the role of VP, CISO and Secure Infrastructure at Under Armour.
35:05
-
Play video Hypershield Customer Advocacy Video
Hypershield Customer Advocacy Video
We asked network and security leaders from Goldman Sachs, The Ohio State University Medical Center, and Cisco about their biggest challenges in protecting AI-scale data centers.
3:44
-
Play video Cisco IT Security Makeover - Season 3 Episode 3
Cisco IT Security Makeover - Season 3 Episode 3
This is episode 3 of Season 3 of Cisco's IT Security Makeover series featuring Mike Storm documenting The French Laundry's IT Makeover using the ASA 5516-X with FTD, Umbrella, Cloud Email Security and AMP4E.
3:33
-
Play video Powerful Partnerships Empowering Digital Success
Powerful Partnerships Empowering Digital Success
Strong partnerships are built on trust, no matter how big or small the managed service. Discover how Cisco, Avit Group, and Tergooi MC worked together to facilitate success with their digital projects in the Dutch healthcare industry.
3:40
-
Play video Building a Secure Future at Fonds Finanz
Building a Secure Future at Fonds Finanz
Discover Fonds Finanz's journey to robust IT security using Cisco's advanced solutions. This transformation led to a standardized and secure infrastructure, fostering a new level of confidence within the organization.
2:13
-
Play video Cisco Firewall Innovations: EVE, AI Assistant, Multi-Instance, and New Management
Cisco Firewall Innovations: EVE, AI Assistant, Multi-Instance, and New Management
Join Nazmul and Yuval to explore the ML-driven Encrypted Visibility Engine (EVE) that can detect and block malware within encrypted traffic. Nazmul also exhibits the AI Assistant in firewall, and discusses the benefits of multi-instance in firewall.
22:10