Cisco Secure Endpoint and Umbrella Use Cases Part 2
2:31
This scenario discusses a remediation use case of how we disconnect an endpoint from the network after Umbrella blocks malicious traffic.
Related Videos
In User & Endpoint Protection
-
Play video Incident Investigation and Customer Interaction: Fireside Chat with David Needleman and Truman Coburn
Incident Investigation and Customer Interaction: Fireside Chat with David Needleman and Truman Coburn
Dive into incident investigation and customer interaction with Cisco Secure Endpoint Product Marketing Manager Truman Coburn and Security Consulting Engineer David Needleman in this fireside chat.
13:38
-
Play video Expanding connector deployment for Cisco Secure Endpoint
Expanding connector deployment for Cisco Secure Endpoint
This video will walk you through Cisco's framework for expanding connector deployment. It will help you understand and gather the information needed to roll out Cisco Secure Endpoint successfully. To learn more, view the article on Cisco Community
6:25
-
Play video Stop Ransomware with Cisco AMP for Endpoints
Stop Ransomware with Cisco AMP for Endpoints
Learn how AMP for Endpoints, Cisco's next-generation endpoint security solution, protects you against ransomware attacks. See what it looks like when unprotected endpoints are infected, and then how quickly AMP for Endpoints stopped the same attack.
3:08
-
Play video Cisco Secure Endpoint - Protected Application Access
Cisco Secure Endpoint - Protected Application Access
This scenario discusses how to protect application access with Cisco Duo and Secure Endpoint.
2:02
-
Play video Alphabet Soup: Making Sense of EDR, MEDR, MDR, XDR
Alphabet Soup: Making Sense of EDR, MEDR, MDR, XDR
There are so many acronyms – EDR, MEDR, MDR, XDR, and more – when it comes to cybersecurity, making it harder to choose the right solution for your organization. Join Nirav Shah in this webinar to better understand these solutions.
12:15
-
Play video Cisco Secure Endpoint – Business Email Compromise
Cisco Secure Endpoint – Business Email Compromise
This scenario discusses how we can respond to an email incident from Secure Endpoint initiated by an automated workflow.
2:30