Cisco’s security portfolio is under a constant state of evolution to protect our customers as new threats also evolve. Join host Jason Wright for straight-to-the-point coverage and live demos of the latest developments in Cisco cybersecurity.
Scott Bower joins us to show CDO's expanded management functionality now supporting Firepower and Meraki devices, in addition to ASA for policies, objects, and migration tasks.
In this episode, we'll show how Firepower events are now integrated into CTR for expanded threat hunting and remediation.
Learn how Cisco takes an application-first approach to security by leveraging the benefits of Tetration, AppDynamics, Stealthwatch, and Duo.
Mun Hossein rejoins us to highlight the improvements in Cisco Email Security 13.0 which include detection enhancements, CTR/CEF integration, enhanced access options, and cloud expansion.
|ThreatWise TV Cisco Live US 2019: Email Cybersecurity Threat Report||Email Security||Email Security|
|ThreatWise TV Cisco Live Barcelona 2019: Interviews with Local Resellers|
|CDO Support Expansion||Cisco Defense Orchestrator (new), ASA (new), Meraki||Firewall|
|Firepower Events in Cisco Threat Response (CTR||Firepower, Cisco Threat Response||Firewall, Incident Response, Breach|
|Application-First Security||Tetration, AppDynamics (new), Stealthwatch, Duo||Workload, Datacenter, Cloud Security|
|Email Security 13.0 Improvements||Cisco Email Security||Email Security|
|Cisco SD-WAN Security||SD-WAN||SD-WAN|
|How EY Works with Cisco||Portfolio||Firewall, Identity Management|
|RSA 2019: Cisco and Endace||Firepower (NGFW), Stealthwatch|
|ThreatWise TV RSA 2019: Email Security Advancements||Cloud Email Security, Email Security, Cisco Threat Response||Email Security|
|ThreatWise TV RSA 2019: Tetration and AnyConnect||Tetration, AnyConnect||Datacenter, Workload, Endpoint|
|ThreatWise TV RSA 2019: Tetration and Identity Services Engine (ISE)||Tetration, ISE||Datacenter, Workload, Identity Management|
|ThreatWise TV RSA 2019: Endpoint and Cisco Threat Response||AMP, Cisco Threat Response||Endpoint, Threat Response|
|Cisco Security Buying Program Options||Portfolio|
|Cisco on Cisco: The CISO Benchmark Study||Portfolio||Threat Response, Cloud Security, Machine Learning|
|How to accelerate your SOC||Cisco threat response, Umbrella, Stealthwatch||Threat Response|
|Secure Data Center CVD||Firepower, Application Centric Infrastructure||Data Center, Workload|
|Cisco Defense Orchestrator (CDO)||Firepower, Defense Orchestrator||Firewall, Data Center|
|Email Security Improvements in 12.0||Cloud Email Security, Email Security||Advanced Phishing Protection, DMARC, Domain Protection|
|Cisco Trusted Access||Duo||Multi-factor Authentication|
|A Quick Look at Multi-Instance Firewalls||Firepower (NGFW)||Firewall|
|Intro to Duo||Duo||Multi-factor Authentication|
|Umbrella Improvements||Umbrella||Web Security, Cloud Security|
|Cisco Threat Response||Threat Response||Incident Response|
|Threat Grid’s New Interface||Firepower (NGFW), Advanced Malware Protection (AMP), Umbrella, Stealthwatch, Threat Response||Cryptomining|
|Trends in Illicit Cryptomining||Threat Grid||Breach, Incident Response|
|Machine Learning in Cisco Security||Advanced Malware Protection (AMP), Threat Response, Umbrella, Stealthwatch||Machine Learning / Artificial Intelligence|
|Cisco and ThreatQuotient||Threat Grid, Umbrella||ThreatQuotient, Threat Intelligence Platform (TIP)|
|Protecting Workloads||Tetration, Firepower (NGFW), Application Centric Infrastructure||Data Center, Workload|
|Protecting Endpoints||Advanced Malware Protection (AMP), Threat Response||Endpoint|
|Securing Branch Offices with Umbrella and Meraki||Umbrella, Meraki, Secure Internet Gateway (SIG)||Branch, SD-WAN|
|Protecting Workloads with Tetration and Stealthwatch||Tetration, Stealthwatch||Data Center, Workload|
|Cisco and LogRhythm||SIEM, LogRhythm||SIEM|
|Cisco Email Domain Protect and Advanced Phishing Protection||Cloud Email Security, Email Security||Domain Protect, Advanced Phishing Protection, Phishing, DMARC|
|Breach Readiness and Response with AMP, SIG, and Services||Advanced Malware Protection (AMP), Umbrella, Secure Internet Gateway (SIG), Services||Breach, Incident Response|
|The Three Lenses of Security||Advanced Malware Protection (AMP), Umbrella, Secure Internet Gateway (SIG), Stealthwatch, Stealthwatch Cloud||Threat Response|
|Security in a Multicloud World||Cloudlock, Stealthwatch, Stealthwatch Cloud, Umbrella, Secure Internet Gateway (SIG)||Cloud Security|
Sorry, no results matched your search criteria(s). Please try again.
Drop in each week for a 60-minute live technical demo and Q&A with Cisco Security experts.
Request a free demonstration today to see Cisco integrated security solutions in action.