Cisco’s security portfolio is under a constant state of evolution to protect our customers as new threats also evolve. Join host Jason Wright for straight-to-the-point coverage and live demos of the latest developments in Cisco cybersecurity.
Ash Devata from Duo joins us to talk about this exciting acquisition and the importance of multi-factor authentication within the Cisco security product family.
Martin Nystrom joins us for a brief overview of Cisco Threat Response, which reduces security event investigation and remediation times.
Scott Bower joins us to discuss and demo a powerful new feature of Firepower 6.3 called Multi-Instance, which allows users to allocate disparate firewall instances within a Firepower appliance.
|A Quick Look at Multi-Instance Firewalls||Firepower (NGFW)||Firewall|
|Intro to Duo||Duo||Multi-factor Authentication|
|Umbrella Improvements||Umbrella||Web Security, Cloud Security|
|Cisco Threat Response||Threat Response||Incident Response|
|Threat Grid’s New Interface||Firepower (NGFW), Advanced Malware Protection (AMP), Umbrella, Stealthwatch, Threat Response||Cryptomining|
|Trends in Illicit Cryptomining||Threat Grid||Breach, Incident Response|
|Machine Learning in Cisco Security||Advanced Malware Protection (AMP), Threat Response, Umbrella, Stealthwatch||Machine Learning / Artificial Intelligence|
|Cisco and ThreatQuotient||Threat Grid, Umbrella||ThreatQuotient, Threat Intelligence Platform (TIP)|
|Protecting Workloads||Tetration, Firepower (NGFW), Application Centric Infrastructure||Data Center, Workload|
|Protecting Endpoints||Advanced Malware Protection (AMP), Threat Response||Endpoint|
|Securing Branch Offices with Umbrella and Meraki||Umbrella, Meraki, Secure Internet Gateway (SIG)||Branch, SD-WAN|
|Protecting Workloads with Tetration and Stealthwatch||Tetration, Stealthwatch||Data Center, Workload|
|Cisco and LogRhythm||SIEM, LogRhythm||SIEM|
|Cisco Email Domain Protect and Advanced Phishing Protection||Cloud Email Security, Email Security||Domain Protect, Advanced Phishing Protection, Phishing, DMARC|
|Breach Readiness and Response with AMP, SIG, and Services||Advanced Malware Protection (AMP), Umbrella, Secure Internet Gateway (SIG), Services||Breach, Incident Response|
|The Three Lenses of Security||Advanced Malware Protection (AMP), Umbrella, Secure Internet Gateway (SIG), Stealthwatch, Stealthwatch Cloud||Threat Response|
|Security in a Multicloud World||Cloudlock, Stealthwatch, Stealthwatch Cloud, Umbrella, Secure Internet Gateway (SIG)||Cloud Security|
Sorry, no results matched your search criteria(s). Please try again.
Drop in each week for a 60-minute live technical demo and Q&A with Cisco Security experts.
Request a free demonstration today to see Cisco integrated security solutions in action.