Have an account?

  •   Personalized content
  •   Your products and support

Need an account?

Create an account

Cisco Threat Response

Security that works together

Are you overwhelmed by too many security investigation tools? Combat the problem with Threat Response, a key component of Cisco SecureX--the broadest, most integrated security platform..

Threat Response accelerates investigations by automating and aggregating threat intelligence and data across your security infrastructure--Cisco and otherwise--into one unified view. Get more value from your security investment when products work together to simplify your experience.

Introducing Cisco SecureX

If your teams spend too much time stitching together point solutions, SecureX can simplify and strengthen your security with a truly integrated platform experience.

Benefits of Cisco Threat Response

Unleash the full power of our integrated security architecture with Cisco Threat Response.

Out-of-box integrations

Get more from your Cisco Security investments when they are already working together.

Designed for your SOC

Investigation and response capabilities combined into one convenient, efficient workbench.

Save time and effort

Speed cyber investigations significantly and take corrective action immediately.

No additional cost

Get it today with integrated Cisco Security product licenses.

Key features of Cisco Threat Response

Aggregated threat intelligence

Integrates threat intelligence from Cisco Talos and third-party sources to automatically research indicators of compromise (IoCs) and confirm threats.

Automated enrichment

Adds context from integrated Cisco Security products automatically, so you know instantly which of your systems was targeted and how.

Intuitive, interactive visualizations

Shows your results on intuitive, configurable graphs for better situational awareness and quick conclusions.

Incident tracking

Provides the capability to collect and store key investigation information and manage and document your progress and findings.

Seamless drill down

Makes deeper investigations easy using integrated Cisco Security products. Want to see where a malicious file went? One click and you are inside AMP for Endpoints.

Direct remediation

Lets you take corrective action directly from its interface. Block suspicious files, domains, and more without having to log in to another product.

Case studies

UNC Pembroke increases efficiency in its SOC (PDF)

See how this fast-growing university met its security challenges using Threat Response, part of Cisco's integrated platform.

See how NHS Management reduced security investigations from days to mere hours with Threat Response and the integrated Cisco Security platform. 

Rackspace has been a leader in professional and managed services for public cloud infrastructure for over 20 years. Its not-so-secret weapon? Cisco Security. 

Featured videos

Integration of email threat detection, investigation, and remediation in minutes.

Watch Cisco Threat Response defeat threats with just a few clicks, directly from your browser.

It's time to rethink firewalling. Learn how you can take advantage of Cisco's integrated platform and get answers--not just alerts.

Cisco Endpoint Security can help you go from exposed to empowered in seconds.

Try now

New customer trial

Don't own a Cisco Security product? Request a free trial of AMP for Endpoints, Umbrella, Email Security, Threat Grid, Stealthwatch Enterprise, or Firepower, and you will automatically get to try Threat Response.

Stealthwatch trial | Umbrella trial | AMP trial | Email Security trial | Threat Grid trial | Get a Network Health Check

Existing customer login

Log in, configure modules for the products you own, and start investigating whether you have been impacted by the latest threats.

Log in >

Onboarding guides

Watch these onboarding videos to learn how to gain access, configure integration modules, and install the browser plug-in so you can maximize your Cisco Security investments.

Start now >

Recommended content

Upcoming webinars

Join our monthly webinars and learn how to quickly stop threats by integrating your Cisco Security products using Cisco Threat Response. 

What customers are saying

"I am able to visualize threats [with Threat Response] and take action in half the time it used to take me."

-Security Engineer, Large Enterprise Banking Company

Why integration matters

Read in ESG's analyst report about the pitfalls of point cybersecurity products and why more industry integration is needed.

Third-party integrations and partners

Connect the security technologies you already have

Does Threat Response work with anything else? Through built-in integrations or leveraging robust APIs, you can integrate Threat Response with threat intelligence feeds and other security tools, such as those from IBM, Google, and Splunk.


Incident Response Services

An effective security operations center is not just about great technology. It’s about how your people, processes, and technology work together to identify threats and swiftly take corrective action. Let Cisco Incident Response Services help you prepare for, manage, and recover from network attacks and data breaches.

Why Cisco Threat Response?

Time is one of the scarcest resources for most organizations. Manual processes and disjointed threat response solutions result in slow and inefficient incident response times that allow threats to proliferate and grow more sophisticated. Cisco Threat Response leverages an integrated security architecture that automates integrations across select Cisco Security products to simplify threat investigations and responses.

With Threat Response, you can simply paste these observables into Cisco Threat Response's "Investigate" user interface and it does the work for you. It brings all that knowledge from intel sources and security products and displays the results in seconds. It empowers your SOC teams, with a single console for direct remediation, access to threat intelligence, and tools like casebook and incident manager. It overcomes many challenges by making threat investigations faster, simpler, and highly effective.