Cisco Secure Endpoint – Business Email Compromise
2:30
This scenario discusses how we can respond to an email incident from Secure Endpoint initiated by an automated workflow.
Related Videos
In User & Endpoint Protection
-
Play video Cisco Secure Endpoint Explainer Video
Cisco Secure Endpoint Explainer Video
Learn how Cisco Secure Endpoint does more than any other endpoint solution by unifying user and endpoint protection, with SecureX built-in.
1:37
-
Play video Expanding connector deployment for Cisco Secure Endpoint
Expanding connector deployment for Cisco Secure Endpoint
This video will walk you through Cisco's framework for expanding connector deployment. It will help you understand and gather the information needed to roll out Cisco Secure Endpoint successfully. To learn more, view the article on Cisco Community
6:25
-
Play video What is Managed Security: Fireside Chat with Tuan Huyn and Truman Coburn
What is Managed Security: Fireside Chat with Tuan Huyn and Truman Coburn
Join Tuan Huyn, Engineering Leader, and Truman Coburn, Cisco Secure Endpoint Product Marketing Manager, in this fireside chat to learn about managed security.
11:44
-
Play video Stop Ransomware with Cisco AMP for Endpoints
Stop Ransomware with Cisco AMP for Endpoints
Learn how AMP for Endpoints, Cisco's next-generation endpoint security solution, protects you against ransomware attacks. See what it looks like when unprotected endpoints are infected, and then how quickly AMP for Endpoints stopped the same attack.
3:08
-
Play video Incident Investigation and Customer Interaction: Fireside Chat with David Needleman and Truman Coburn
Incident Investigation and Customer Interaction: Fireside Chat with David Needleman and Truman Coburn
Dive into incident investigation and customer interaction with Cisco Secure Endpoint Product Marketing Manager Truman Coburn and Security Consulting Engineer David Needleman in this fireside chat.
13:38
-
Play video Cisco Secure Endpoint - Protected Application Access
Cisco Secure Endpoint - Protected Application Access
This scenario discusses how to protect application access with Cisco Duo and Secure Endpoint.
2:02