Cisco’s security portfolio is under a constant state of evolution to protect our customers as new threats also evolve. Join host Jason Wright for straight-to-the-point coverage and live demos of the latest developments in Cisco cybersecurity.
How do you build a secure data center quickly and effectively? Senior Solutions Architect Albra Welch joins me to demo how the Cisco Validated Design (CVD) provides a blueprint to get you there.
CDO can do amazing things to manage large-scale ASA deployments today. We'll demo the current capabilities and preview what CDO will mean to Firepower in the future.
Email Security Product Management Director Mun Hossain joins us for an overview of new features and improvements to the email security product line.
|Secure Data Center CVD||Firepower, Application Centric Infrastructure||Data Center, Workload|
|Cisco Defense Orchestrator (CDO)||Firepower, Defense Orchestrator||Firewall, Data Center|
|Email Security Improvements in 12.0||Cloud Email Security, Email Security||Advanced Phishing Protection, DMARC, Domain Protection|
|Cisco Trusted Access||Duo||Multi-factor Authentication|
|A Quick Look at Multi-Instance Firewalls||Firepower (NGFW)||Firewall|
|Intro to Duo||Duo||Multi-factor Authentication|
|Umbrella Improvements||Umbrella||Web Security, Cloud Security|
|Cisco Threat Response||Threat Response||Incident Response|
|Threat Grid’s New Interface||Firepower (NGFW), Advanced Malware Protection (AMP), Umbrella, Stealthwatch, Threat Response||Cryptomining|
|Trends in Illicit Cryptomining||Threat Grid||Breach, Incident Response|
|Machine Learning in Cisco Security||Advanced Malware Protection (AMP), Threat Response, Umbrella, Stealthwatch||Machine Learning / Artificial Intelligence|
|Cisco and ThreatQuotient||Threat Grid, Umbrella||ThreatQuotient, Threat Intelligence Platform (TIP)|
|Protecting Workloads||Tetration, Firepower (NGFW), Application Centric Infrastructure||Data Center, Workload|
|Protecting Endpoints||Advanced Malware Protection (AMP), Threat Response||Endpoint|
|Securing Branch Offices with Umbrella and Meraki||Umbrella, Meraki, Secure Internet Gateway (SIG)||Branch, SD-WAN|
|Protecting Workloads with Tetration and Stealthwatch||Tetration, Stealthwatch||Data Center, Workload|
|Cisco and LogRhythm||SIEM, LogRhythm||SIEM|
|Cisco Email Domain Protect and Advanced Phishing Protection||Cloud Email Security, Email Security||Domain Protect, Advanced Phishing Protection, Phishing, DMARC|
|Breach Readiness and Response with AMP, SIG, and Services||Advanced Malware Protection (AMP), Umbrella, Secure Internet Gateway (SIG), Services||Breach, Incident Response|
|The Three Lenses of Security||Advanced Malware Protection (AMP), Umbrella, Secure Internet Gateway (SIG), Stealthwatch, Stealthwatch Cloud||Threat Response|
|Security in a Multicloud World||Cloudlock, Stealthwatch, Stealthwatch Cloud, Umbrella, Secure Internet Gateway (SIG)||Cloud Security|
Sorry, no results matched your search criteria(s). Please try again.
Drop in each week for a 60-minute live technical demo and Q&A with Cisco Security experts.
Request a free demonstration today to see Cisco integrated security solutions in action.