Explore our collection of case studies, community posts, virtual events, guides, and videos. Use the filters below to find resources organized by technology, product, and resource type.
Featured
No results found. Try a different resource type or choose a different technology.
This repository is a collection of documents, guides, videos, etc. that will help you optimize your Cisco Secure Firewall through the LevelUp Upgrade Program
This webinar showcases Cisco Secure Firewall 7.7’s new features and upgrades, focusing on enhanced security, management, and performance improvements. (Video: 28:47)
Umbrella analyzes and learns from internet activity patterns, automatically uncovering attacker infrastructure staged for current and emerging threats.
Explore the key features of Cisco NSO and understand its benefits compared to traditional scripting. Discover how NSO automates network configurations, supports multi-vendor environments, and enables real-time service provisioning. (Video: 1:20:54)
Discover how Cisco NDFC provides centralized fabric management for visibility and control, enhances automation via integrations like Ansible for efficient operations, and ensures scalability with high availability using a three-node active-active Nexus Dashboard cluster for reliable data center networking. In this webinar, we will show you how to download the controller for free to start realizing the value and benefits NDFC provides. (Video: 57:52)
In this webinar recording, you’ll discover how, as an Umbrella DNS customer, you are uniquely positioned to evolve to Cisco Secure Access – DNS Defense, our upcoming DNS-centric addition to the Secure Access product family.
Learn about the benefits and value of Cisco Intersight. Our experts will provide a technical overview and explain the business outcomes of the Simplified Operations use case. (Video: 48:32)
Buckinghamshire Council leverages Cisco networking technology, services, and solutions to deliver a new unified IT environment for local county services.
Customers will explore ACI 6.x key features which will help them to improve resiliency, visibility, security in their data center with very exciting new features and enhancements.
This playlist overview highlights Cisco's "AI and Cybersecurity: The Future of Defense" webinar, showcasing how AI is revolutionizing cybersecurity through strategies like test-time compute, edge AI, and shadow AI risk management to enhance security across IT, healthcare, and digital infrastructures. (Video: 31:01)
In the final session of our three-part Splunk AppDynamics scripting series, we focus on advanced API script building. In this webinar a Splunk AppDynamics Observability Engineer will guide you through crafting sophisticated synthetic scripts for API monitoring, covering advanced use cases, troubleshooting techniques, and optimization strategies. This session will help you master the tools and methods needed to monitor APIs effectively and ensure seamless application performance.
Join us for our second session of the three scripting sessions, where a Splunk AppDynamics Observability Engineer walks you through building your first synthetic scripts, for BRUM. Feel free to simply watch or take the opportunity to get hands-on experience by following along using templates we provide. Either way, the goal is for you to develop a strong foundation on Splunk AppDynamics Scripting, which we'll be building on in future sessions.
Join us as our experts walk you through Cisco SD-WAN Secure Direct Internet advanced features and how features align to key performance indicators. (Video: 47:03)
Elevate your expertise on Day 2, dedicated to Advanced Features for Threat Hunting & Integration. From 10:00 to 11:15 CEST, learn proactive threat hunting using powerful Orbital queries and secure your endpoints with robust Device Control & Host Firewall techniques against intrusions. Following a brief break, the 11:30 to 12:45 CEST session will reveal the power of Seamless Integrations, showing you how to unify threat management with XDR, ESA, and Firewall for unparalleled visibility and streamlined workflows. Cap off the day with a valuable Q&A and closing session from 12:45 to 13:00 CEST. Secure your spot to become a true security architect.
Turkcell adopts Cisco ACI to create multi-tenant virtual data center network across four physical sites, accelerating service delivery for corporate and public enterprise customers.
With aging systems and the need to modernize, DLIR and Cisco delivered an upgraded system that will power their small team to success for years to come.
Investing in digital infrastructure to create a seamless, modern university experience, enhancing flexibility, digital learning, and research capabilities
This summer's Olympic and Paralympic Games promise to be the most digital ever. A record number of broadcast media will rely on seamless connectivity to tell their stories to the world.
Enhancing DP World’s mission-critical operations by reimagining infrastructure at key ports and terminals, ensuring uninterrupted and efficient trade processes
Synthetic Monitoring is essential for ensuring user flows, online resources, and for APIs to perform seamlessly, but getting started can feel overwhelming. In this session, we'll guide you step-by-step through Splunk AppDynamics Synthetics, from building a strong foundation to mastering advanced scripting techniques.
CDS enhances security, streamlines operations, and empowers teams to stay ahead of evolving threats by harnessing Cisco’s AI-driven firewall innovations such as AIOps and the Cisco AI Assistant for Security.
Join us for a deep dive into Plug-n-Play, LAN Automation and for Day 0 Provisioning. Learn how Cisco LAN automation simplifies network operations and frees IT staff from time-consuming, repetitive, network configuration tasks.
Join us for a deep dive into templates: DayN Provisioning, RMA and SWIM. Learn how they are designed to reduce operational effort and improve automation.
This repository will help you optimize resources, reduce spending, and enhance your organization's digital agility with Cisco's powerful Catalyst Center management system that uses AI to connect, secure, and automate network operations.
Explore how cloud-based Meraki and on-premises Catalyst Center each offer unique benefits for managing Catalyst 9000 switches. Discover key features like configuration, assurance, analytics, and campus use cases through live demonstrations of both tools.
This repository is a collection of documents, guides, videos, etc. that will help you optimize your network with Catalyst Center software version 2.3.7.7 Key Features
Join us as our experts walk you through how to simplify change management using Delta Analysis to compare the health of the fabric pre- and post-change to rapidly determine whether changes caused any incidents in the network. (Video: 39:44)
Customers will explore Cisco ACI 6.x key features which will help them to improve resiliency, visibility, security (zero-trust), and much more with enhanced UI capabilities.
Join us to explore Tenant Routed Multicast foundations and architecture, as well as the benefits to your organization and the requirements and considerations to enable TRM in a VXLAN EVPN fabric environment. (Video: 28:07)
Learn more about common performance issues that may impact VXLAN EVPN fabrics. Our experts will also share best practices to optimize your VXLAN EVPN fabric performance. (Video: 56:07)
Join us as our experts walk you through the use cases and benefits that you and your IT team will realize when Cisco ACI is integrated with the ITSM and ITOM solution ServiceNow. (Video: 1:00:45)
Automated Transaction Diagnostics AKA Anomaly Detection uses Machine Learning to automatically recognize anomalies that are not significant enough to cause alerts but can cause future issues. ATD can then suggest root cause by analyzing multiple snapshots. (Video: 4:49)
Learn how the AppDynamics Cluster Agent can help give insight into your Kubernetes and OpenShift deployments. See how the AppDynamics platform collects, aggregates, and presents cluster data from containers and pods in the UI. (Video: 6:20)
Learn the fundamental concepts behind one of the most crucial concepts in AppDynamics - Business Transactions. This short tutorial also covers how to analyze the performance of business transactions and dives into transaction snapshots, allowing you to find the exact lines of code responsible for performance degradation. (Video: 10:22)
Learn how to use Dash Studio to quickly spin up a dashboard you can use to compare the performance of different release versions of your applications. (Video: 7:40)
Capture Custom Data to find records of interest using the JavaScript Agent to add context within Browser RUM. This demo utilizes a single page application built using Angular. (Video: 4:57)
This is video is for Cisco’s FSO AppDynamics. This video walks through how to configure AppDynamics Extensions. This video assumes you've built an extension and shows how to deploy and configure the extension. Includes a full walkthrough and validation using Workbench. (Video: 15:54)
Learn the basics behind health rules that use a series of metrics and evaluate those metrics against user defined thresholds to give you an idea on how your application is performing. (Video: 11:54)
Learn how to deploy a Java application agent inside an EKS environment. This video demonstrates how to use the pre-built Java Agent and walks through the installation process, culminating with a successful instrumentation of a Hello World application. (Video: 12:02)
A short how-to compile AppDynamics Extensions through the installation of Maven, including a short background of Maven and a walkthrough of Cisco DevNet. (Video: 7:25)
Learn how to instrument Browser Real User Monitoring (BRUM) as part of the End User Monitoring (EUM) solution set. This video covers four instrumentation methods to show how you can inject the JavaScript agent into your web pages for monitoring and includes a walkthrough of how to set up BRUM within the AppDynamics Controller. (Video: 10:44)
Walk through the manual instrumentation process of AppDynamics Mobile Real User Monitoring (MRUM) as part of the End User Monitoring (EUM) solution set, for an Android based mobile application using Gradle and Android Studio. (Video: 13:04)
Learn how to leverage the Policies and Actions for alerts from AppDynamics. Also become familiar with the other available automation options you can choose. (IE JIRA/SNOW integrations, remediation scripts, and other customer actions). (Video: 6:34)
Learn about Business Transaction Overflow and how to manage BTs by utilizing the “All Other Traffic” bucket and other best practices for ensuring a well-managed set of BTs. (Video: 1:42)
This session covers emerging cybersecurity threats, an example of HTTP smuggling, and their impact on organizations. Discover the role of Incident Response and how Cisco solutions such as, Secure Email, Secure Network Analytics, and NGFW can help protect your business. Gain practical strategies to enhance your security posture in today's evolving threat landscape.
This playlist details how Cisco Duo’s risk-based authentication solutions empower businesses to assess their security posture and adopt effective MFA strategies—covering threat modeling, user engagement, device posture, and building a secure culture across the organization.
This playlist a playlist demonstrates how Duo Mobile’s third‑party account support enables secure backup and restoration—via iCloud/Google Drive—of personal TOTP accounts using the Duo Restore feature on iOS and Android.
Duo simplifies the deployment process by providing end-user communication resources, email templates, and deployment kits to ensure a smooth rollout. Educating users about Duo and giving them advanced notice significantly improves adoption and reduces help desk burden. (Video: 2:11)
Duo's Help Desk Administrator course is designed to empower support teams with the knowledge and tools needed to assist end-users effectively. The course covers troubleshooting, user account management, and strategies for enabling self-service solutions. (Video: 1:03)
Duo Security, now part of Cisco, offers custom branding options to enhance your user authentication experience. This feature allows organizations to align the Duo interface with their brand identity, ensuring a seamless and trustworthy user experience.
This playlist overview highlights Cisco Duo’s risk-based authentication features—showcasing how Verified Push, Wi‑Fi fingerprinting, and emerging passwordless options enhance security by adapting authentication based on real-time risk signals.
This session covers best practices for deploying Cisco Identity Services Engine to ensure secure network access and scalable policy enforcement. (Video: 57:13)
Learn how to leverage the Intersight Managed Mode (IMM) to combine the capabilities of the UCS Systems and the cloud-based flexibility of Intersight, unifying the management experience for the standalone and Fabric Interconnect attached systems. (Video: 57:24)
Join us as our experts walk you through the Plan and Placement features of Cisco Intersight Workload Optimizer (IWO). The Plan feature allows you to simulate optimizing resources in the cloud or on-prem to create an actionable plan for migrations, while the Placement feature reserves resources for future workloads. (Video: 44:38)
Learn how to configure policies and set business rules to control how Cisco Intersight Workload Optimizer analyzes resource allocation, how it displays resource status, and how it recommends or executes actions. (Video: 1:03:07)
Customers will embark on a journey with real-life examples to illustrate how ND4.1 will provide enhanced visibility, simplify operations, improve productivity and efficiency for ACI, NDFC and NX-OS fabrics.
Customers will learn the key use-cases of Nexus dashboard and dive in to upgrade and deployment best practices so that they can start using new and enhanced features of Nexus Dashboard.
Learn about some of the features and enhancements that Nexus Dashboard Fabric Controller brings to the management of VXLAN EVPN fabrics. Our experts will also guide you through some of the architectural changes in NDFC 12 compared to previous DCNM versions. (Video: 42:17)
Learn about the importance of Multicast in the VXLAN EVPN fabric and how it processes multi-destination traffic. Our experts will review deployment options and specific use cases, then walk you through implementation, verification, and troubleshooting workflows using Cisco NDFC. (Video: 31:33)
Learn about the key concepts and considerations involved in performing a successful Nexus Dashboard Fabric Controller upgrade. Our experts will review best practices to ensure a smooth experience for your organization. (Video: 1:02:40)
Join us as our experts walk you through the Nexus Dashboard Fabric Controller and Nexus Dashboard Orchestrator features, which enable you to address use cases for distributed services over multiple data centers while leveraging independent VXLAN EVPN fabrics. (Video: 51:19)
Join us as our experts walk you through best practices for upgrading the Cisco SD-WAN fabric with little-to-no service impact. By the end of this session, participants will understand the required steps for upgrading and activating the controllers and the WAN edges. (Video: 48:24)
This playlist overview highlights the Cisco Firewall AI Assistant webinar, showcasing how the AI Assistant simplifies firewall management by summarizing complex policies, analyzing event data for faster troubleshooting, and automating workflows to enhance network security and efficiency. (Video: 28:10)
Join us for a webinar on Cisco Secure Firewall and the need for customers to upgrade their outdated firewall code versions to improve performance, security, and integration, and highlighted Cisco's recognition as a leader in enterprise firewalls. (Video: 28:22)
Join our experts to learn tips for maximizing your deployment. In this webinar we'll cover the keys to a healthy deployment, how to troubleshoot issues as they arise and where to find information on product updates. You also have plenty of time to ask questions in our Q&A session after the presentation.
This video explores Cisco’s Vulnerability Management roadmap and research, detailing new strategies to identify, prioritize, and mitigate security risks. (Video: 40:27)
Cisco XDR has provided several enhancements to product functionality including new integrations, new user experience enhancements, and new coverage for threats! (Video: 35:07)
This video highlights Cisco XDR’s latest enhancements for accelerating incident response, including automation and analytics improvements. (Video: 1:00:27)
Customers will learn how Splunk AppDynamics and Splunk Log Observer connect together enhance troubleshooting by providing unified visibility, faster issue detection, and streamlined log analysis with secure, seamless integration.
Join us as your experts walk you through the onboarding process for Cloud Monitoring for Catalyst with Meraki Dashboard. Learn about Cloud Monitoring dependencies and prerequisites, and how to get the most out of Cloud Monitoring features. (Video: 41:12)
Join us for Day 1 focusing on Configuration & Deployment Best Practices. From 10:00 to 11:15 CEST, discover essential strategies for host-specific configurations and master policy creation, understanding detection engines and effective exclusions to fortify your defenses. After a refreshing break, dive deeper from 11:30 to 12:45 CEST into cutting-edge Zero-Day Attack Protection and Performance Tuning, ensuring seamless security without compromising system speed. Conclude your learning with an interactive Q&A and closing session from 12:45 to 13:00 CEST. Don't miss this opportunity to optimize your organization's security posture.
Join us as our experts walk you through Cisco ACI CNI architecture design concepts and dependencies. The session will cover Cisco ACI integration with container orchestrators and steps to prepare the policy framework for ACI in a container environment. (Video: 44:58)
Learn how to deploy and manage Cisco NSO in containers for greater consistency and scalability. Discover best practices, migration tips, and streamline network automation in modern environments.
Customer Digital Experience Monitoring services will provide visibility all the way to user platforms, align digital experience with business results, de-risk rollouts, and reduce time to identify and resolve performance and end-user issues.
Join us to learn more about Cisco NDFC Policy Template components. Our experts will review best practices for adding custom configuration to your devices and complete a compliance check. (Video 1:00:25)
This video features a short demo showcasing how telemetry in Cisco firewalls enhances network visibility, performance monitoring, and security, while also improving operational efficiency. (Video: 5:47)
Cisco Identity Services Engine integrates with various Cisco products and third-party solutions to enhance network security and management. (Video: 11:39)
This video highlights how enabling posture in Cisco ISE enhances endpoint compliance, supports Zero Trust security, reduces operational load, and includes a brief demo of these capabilities in action. (Video: 16:03)
This video provides a short demo on Cisco’s Secure Firewall, and how it uses AI and Talos threat intelligence to deliver fast, integrated threat detection and response. (Video: 11:12)
In the following video, you will learn about Transport Layer Security (TLS) decryption for Cisco firewalls, which offers several important benefits to enhance network security, visibility, and policy enforcement. (Video: 17:57)
This video covers Cisco Identity Services Engine , a comprehensive Network Access Control (NAC) solution that serves as the foundation for a zero trust security model. (Video: 12:49)
This short video highlights the significant benefits of enabling Cybercapsule: ISE-Profiling. This feature is essential for enhancing visibility and offers several benefits that enhance network security and management. (Video: 14:40)
This video provides a clear overview of the Host Firewall feature in Cisco Secure Endpoint, showing how you can centrally manage and enforce network traffic rules for Windows and macOS devices. (Video: 7:42)
In this video you can learn about the integration of Cisco Secure Endpoint with other Cisco products brings significant benefits, enhancing security posture, operational efficiency, and overall user experience. (Video: 9:33)
In this video you can learn how Umbrella Secure Web Gateway (SWG) offers robust cloud-delivered security designed to protect users from web-based threats, enforce acceptable use policies, and improve visibility into internet activity. (Video: 6:22)
In this video you can learn how Cisco Firewall can be integrated with various platforms to enhance network security and management. The video includes a demo about the integration of Cisco Firewall with other products. (Video: 8:16)
Join us as our experts help you operationalize day-to-day performance of your Meraki deployment using tools such as network alerts, change log, summary report and security center. (Video: 57:16)
Join us as our experts walk you through best practices to monitor computing infrastructure with Cisco Intersight. This session will cover faults, advisories, HCL, and more. (Video: 45:10)
Explore how Cisco is transforming cybersecurity with advanced capabilities—including next-generation encrypted traffic management and effortless cloud integrations—designed to address today’s most pressing security challenges.
Discover how nano services in Cisco NSO enable staged provisioning and safer automation for complex, multi-step network functions. Learn to break down services into manageable, reliable steps for modern environments.
Join us as our experts walk you through how to install Enterprise Agent on Catalyst 9000 Series Switches in your campus network. Our experts will also show you different types of tests available for Enterprise Agents and how to configure a test and view the test results. (Video: 52:30)
Join us as our experts walk you through the requirements and deployment considerations for the Nexus Dashboard Insights application on a Nexus Dashboard cluster. This session will cover initial setup and how to onboard sites and enable key functionalities like assurance and bug scans for compliance and optimal operations. (Video: 48:29)
Join us as our experts walk you through the requirements and deployment considerations for the Nexus Dashboard Insights application on a Nexus Dashboard cluster. This session will cover initial setup and how to onboard sites and enable key functionalities like assurance and bug scans for compliance and optimal operations. (Video: 48:29)
Customers will be guided through the deployment and configuration of the IMM domain, focusing on the setup of Fabric Interconnect profiles and associated policies. Attendees will gain a clear understanding of how to streamline infrastructure management through effective configuration practices.
Customers will explore the deployment and configuration of the IMM domain with a focus on setting up UCS Server profiles and policies. Attendees will learn best practices for standardizing and automating server configurations to improve consistency and efficiency.
Join us as our experts walk you through the basics of the Catalyst Center (Formerly Cisco DNA Center) on AWS. You will learn what are the components that make up a virtualized deployment of Catalyst Center, how devices will communicate with atalyst Center, as well as the steps necessary to deploy the virtual appliance. (Video: 48:31)
Join us as our experts walk you through some of the best practices around Cisco ACI object naming conventions, optimizing BUM traffic behaviour in the fabric, tuning end point tables for efficiency, and other design practices related to deploying an ACI fabric. (Video: 39:16)
Join us for an overview of how to get started using Intersight by creating your SaaS account or deploying the virtual appliances and setting up your on-prem deployment. (Video: 52:30)
Join us as our experts walk you through Meraki API categories, their features and uses. Learn about Dashboard API, Webhooks, Scanning API, and MV sense. (Video: 15:49)
Join our experts for a technical overview of Cisco Intersight. Learn how Intersight can help simplify your data center operations while cutting costs and reducing time-to-implement. This session will also cover prerequisites and architecture components of Intersight. (Video: 44:42)
Discover how to manage and optimize telemetry ingestion in Cisco Secure Network Analytics. Learn to leverage the Data Store and Cisco Telemetry Broker for improved network visibility, efficient data management, and enhanced threat detection.
Explore host grouping in SNA to segment networks, set behavior baselines, and boost monitoring. Learn performance tuning strategies to optimize Cisco Secure Network Analytics for stronger security and operational excellence.
Learn more about the benefits of VXLAN EVPN Multi-Site. Our experts will provide a technical overview and review requirements and deployment support options for the products and integrations used in the Distributed Networking with NDFC use case. (Video: 47:11)
Join us to learn about the benefits and value of Cisco ACI Multi-Site and Multi-Pod. Our experts will provide a technical overview and review the requirements as well as the deployment support options for the products and integrations used in Distributed Networking with Nexus Dashboard Orchestrator. (Video: 52:35)
Join us to learn about the benefits and value of VXLAN EVPN Multi-Site. Our experts will provide a technical overview and walk you through the requirements as well as the deployment support options for the products and integrations used in the Distributed Networking with Nexus Dashboard Fabric Controller and Nexus Dashboard Orchestrator. (Video: 36:41)
Cisco Secure Access – DNS Defense, our new DNS-centric addition to the Secure Access product family. We’ll detail how you can maximize your Cisco Umbrella license by evolving to Secure Access - DNS Defense while getting more security features with no added cost, including cloud DLP, cloud malware protection and a long-term trial of our ZTNA + VPNaaS capability. This webinar will also include a
live demonstration of new features you get with Cisco Secure Access DNS - Defense, and our automated upgrade manager tool that enables you to easily pivot from Umbrella DNS to Secure Access typically in 5 minutes or less.
The Cisco Duo webinar: Enhance Your Application Security is now available for viewing, offering insights into managing administrators, integrating Duo's two-factor authentication, and deploying the Duo Authentication Proxy for secure connections. (Video: 1:01:10)
Learn how configurations in Data Centers offer scalable solutions for growth and adaptability to changing demands. Enabling Intersight connectivity activates Connected TAC, providing pro-active and automated reactive support at no additional cost. Pro-active support uses telemetry to open TAC cases and initiate troubleshooting, while reactive support automates log collection, remote command execution, and log gathering from neighboring devices upon TAC SR case opening. (Video: 1:02:21)
This webinar provides an in-depth overview of the latest updates and enhancements to Cisco's XDR (Extended Detection and Response) platform. (Video: 35:00)
Cisco and BT collaborate to host multiple private cloud solutions, supporting critical voice applications for consumer, enterprise, government, and blue light services
Join us as our experts walk you through the Cisco SD-WAN solution cloud computing integration using the cloud Onramp workflows. At the end of the session, participants will gain knowledge on instantiating cloud IaaS, SaaS and Co-location infrastructures into the SD-WAN fabric for their use case. (Video: 57:53)
Join us as our experts walk you through Cloud Management for Catalyst Wireless. Understand different management options for supported Catalyst Wireless access points and get an introduction to main Meraki Wireless features. (Video: 55:12)
Join us as our experts walk you through Cloud Management for Catalyst Wireless. This session will address different management options for supported Catalyst Wireless access points and introduce you to Meraki Wireless features. (Video: 55:12)
A few highlights from the session are:
-Scale your ISE deployment: Learn the best methods on how to scale your ISE deployment with key expert tips and actions to avoid during deployment.
-Device Administration best practices: Learn about the three methods of deployment, PSN's for TACAS+ and other services and network groups as well as policy sets.
-Guest Access Overview: Explore what is Guest Access, the different elements within Guest Access as well as the different steps of configurations and policy sets.
A few highlights include:
-Secure Access overview: Gain a better understanding of the Secure Access product, license differentiation, use case connection options, and view a live demo walkthrough.
-AI Access with Secure Access Advantage: Explore how Secure Access AI Access goes beyond DLP to secure the AI-enabled workplace.
-Experience Insights deep dive: Discover how Cisco Experience Insights uses real-time monitoring of digital experiences to enable IT teams to proactively resolve issues, reduce operational overhead, minimize downtime, and enhance user satisfaction.
-Secure Access and ISE: Learn about how Secure Access ISE integrations can help enhance your network security and management capabilities.
Embark on a journey with real-life examples to illustrate how NDI will provide enhanced visibility, simplify operations, improve productivity and efficiency.
Join us as our experts walk you through how Nexus Dashboard Insights brings together real-time insights and automation services to operate multi-cloud data center networks spanning on-premises, virtual edge, and cloud sites to resolve common operational challenges and create business value. (Video: 13:58)
A feature-focused webinar on Duo integration with Cisco Identity (CII) for APJC customers, detailing enhanced authentication and identity management features. (Video: 1:00:11)
Join us for a webinar on Cisco Identity Intelligence including how it works, what it can achieve, and how it ensures smarter authentication with Duo. (Video: 57:51)
Single sign-on (SSO) is an important aspect of access management, which also includes multi-factor authentication (MFA) and user and device policies for today's hybrid workforce. With single sign-on, end users only need a single set of credentials to log into multiple websites and applications, both in the cloud and on premises. This makes life easier for users, since they don’t have to remember multiple passwords, and provides administrators a centralized way to manage all accounts and govern which users have access to them. Join us as we explain the benefits of single sign-on and how it helps users and organizations alike! In this webinar, you will learn: • The high-level of Duo Single Sign-On (SSO) feature • The process to configure the Duo SSO and validate its operations • The administrative and end-user benefits when using Duo SSO • Demo of SSO in action!
Join our experts to learn more about the Cisco ACI remote leaf feature, which enables you to address use cases for distributed services over multiple data centers and helps to extend ACI policy domain from a main data center to a remote location. (Video: 56:37)
Join us as our experts walk you through the product features involved with applications optimization, and teach you how features align to key performance indicators. (Video: 51:59)
In this session we will explore advanced Segment Routing capabilities with a detailed overview of SR-PCE and SR-TE features. This session highlights the power of these technologies in Multi-AS environments, showcasing their role in optimizing traffic engineering and network control.
Join us as our experts explore how Nexus Dashboard Insights can provide better visibility into application traffic and performance statistics in your data center network through hardware flow telemetry. (Video: 36:32)
The University of Western Australia (UWA) partners with Cisco to modernise its network infrastructure as well as transform its teaching, research, and administration functions.
Join us as our experts walk you through an overview of Cisco SD-WAN Cloud OnRamp for MultiCloud Connectivity, its components and use cases. (Video: 1:02:32)
Join us as our experts explain how to protect your critical assets and data through Cisco SD-Access Segmentation. In this session, you will learn how to resiliently respond to evolving threats and achieve network agility and efficiency. (Video: 56:58)
Discover how our Security Service Edge (SSE) solution delivers secure, seamless access for users on any device, featuring an intuitive new dashboard for simplified policy management and enforcement. Key takeaways include understanding the differences between Secure Internet Access and Secure Private Access, practical demos on web and private traffic controls, and hands-on guidance for configuring advanced security features like VPN, Zero Trust, and step-up authentication.
Join us as our experts walk you through an overview of Cisco SD-WAN Cloud OnRamp for MultiCloud Connectivity, its components and use cases. (Video: 37:10)
Join us as your experts walk you through the onboarding process for Cloud Monitoring for Catalyst with Meraki Dashboard. Learn about Cloud Monitoring dependencies and prerequisites, and how to get the most out of Cloud Monitoring features. (Video: 42:04)
Join us as our experts walk you through the process of creating Scalable Access Policies that reflect your organization's business intent through Cisco SD-Access. (Video: 1:12:27)
In this session we will learn the core principles, architecture, and key components of Segment Routing, setting the stage for seamless network evolution. Perfect for beginners and network professionals seeking a strong starting point.
Learn how to deploy a VXLAN EVPN fabric from scratch. Our experts will review design approaches, prerequisites, and considerations to ensure success in your fabric provisioning and operations throughout your Nexus Dashboard Fabric Controller journey. (Video: 44:53)
Learn how to troubleshoot with AppDynamics, identifying issues using the "following the red" methodology and through health rule violations, to then drill down into Transaction Snapshots to identify root cause. This does not include Anomaly Detection. (Video: 10:53)
A short tutorial on managing business transactions. Refresh your memory on business transactions, how they are auto discovered and how BTs can enter a state of overflow. Learn the various tools available within AppDynamics to manage BTs including custom match rules, business transaction lockdown and how to handle BT overflow. (Video: 11:30)
Learn about the Metric Browser which contains all the metrics captured within an AppDynamics application. Explore the various options and visualization tools within the Metric Browser to fully understand all aspects of the performance of your monitored applications. (Video: 7:12)
Hybrid Mesh Firewall platforms address the growing complexity of implementing and managing firewalls across multiple use cases.This webinar will give you an understanding of the Hybrid Mesh Firewall concept, an overview and benefits of the concept, and a focused demo of one use case, Cloud Edge.
Join us as our experts walk you through the Direct Internet Access use case and use case installation or implementation overview, software installation and compatibility guidelines, and the step-by-step process to complete the installation, including the initial configurations the process requires. (Video: 15:17)
In this session we will dive deeper into the world of integration with a focus on MPLS LDP interworking in Segment Routing environments. Gain valuable insights into how existing MPLS networks can interoperate with Segment Routing, ensuring a smooth transition and operational efficiency.
This repository is a collection of documents, guides, videos, etc. that will help you optimize your network with Cloud & Hybrid Operating Mode for Catalyst Switches
This session provides a comprehensive overview of the XR Flexible Consumption Model, highlighting its "pay-as-you-grow" licensing approach that separates hardware and software pricing to simplify license management and optimize network operations. Attendees will learn about the key components of FCM, including hardware tracking licenses, Right to Use (RTU) perpetual licenses, and Software Innovation Access (SIA) subscriptions, and how these enable network-wide license pooling, license portability, and continuous software innovation.
Customers will have the opportunity to see Intersight’s capabilities and latest and greatest features introduced in last releases. All with live demonstrations.
While Duo provides a strong security foundation, the dynamic threat landscape necessitates continuous identity authorization. Cisco Identity Intelligence (CII) addresses this critical need. This session will demonstrate its setup and how it enables comprehensive identification, protection, detection, and response to identity threats.
This playlist highlights how to use Cisco Secure Endpoint and APIs to boost threat hunting, automate incident response, and strengthen cybersecurity with Cisco XDR. (Video: 54:39)
A live demo showing how Cisco Secure Endpoint reduces attack surfaces through threat prevention, detection, and response capabilities. (Video: 1:01:32)
In nearly 5000 properties in its portfolio throughout the U.S. and Canada, Marriott uses Umbrella in a first-of-its-kind initiative to block guest network access to online child sexual abuse materials (CSAM).
Join us for a webinar on the benefits of Duo's identity security health check webinar and the resources available for customers to improve their secure identity posture. (Video: 43:49)
This webinar provides best practices to maximize Cisco ISE deployment in the Americas region, improving performance and security posture. (Video: 43:49)
UK hospitality giant crafts a cloud-first recipe with a healthy serving of Cisco and a dash of Meraki to create secure, reliable lodging and dining experiences
Join us to learn how to implement Multi-Site between VXLAN EVPN fabrics. Our experts will share best practices and workflows for enabling the recommended designs, Anycast or vPC BGWs, as well as review how to configure the core router for Multi-Site scalability. (Video: 45:45)
Join us to review architecture requirements for Multi-Pod and Multi-Site for Cisco ACI. By the end of this session, you will be enabled to select the best option for your organization when planning the expansion of data centers. (Video: 1:02:30)
Spanish neobank MyInvestor used Cisco Multicloud Defense to gain consistent visibility and control of its public cloud to protect over 300,000 customers from threats.
Customers will learn the key use cases of Nexus Dashboard and dive in to upgrade and deployment best practices so that they can start using new and enhanced features of Nexus Dashboard.
Customers will embark on a journey with real-life examples to illustrate how ND4.1 will provide enhanced visibility, simplify operations, improve productivity and efficiency for ACI, NDFC and NX-OS fabrics.
Embark on a journey with real-life examples to illustrate how ND4.1 will provide enhanced visibility, simplify operations, improve productivity and efficiency for Cisco ACI, NDFC and NX-OS fabrics.
Customers will discover how Cisco Nexus Dashboard transforms Traditional Data Centers with its advanced features and best practices. This session will showcase demonstrations on Enhanced Classic LAN management, monitoring, could empowering customer to streamline and optimize your DC operations.
Customers will learn how Cisco Nexus Dashboard enables seamless AI infrastructure management. This session covers best practices for designing, deploying, and optimizing data center fabrics to support AI workloads, with practical demonstrations to enhance performance and scalability.
Customer will learn the full potential of Cisco Nexus Dashboard with a focus on VxLAN EVPN. This session provides key insights into designing, deploying, and managing VxLAN EVPN fabrics, supported by practical demonstrations to streamline operations and optimize network performance.
Join us to learn about the business requirement of connecting VXLAN EVPN fabrics to an external Layer 3 domain. Our experts will demonstrate design options and review how to implement external connectivity using Nexus Dashboard Fabric Controller. (Video: 39:24)
Explore how Cisco NSO integrates with CI/CD pipelines in the DevOps era. Learn best practices for automated testing, deployment, and boosting reliability in your network automation workflows.
Join us as our experts share best practices for leveraging Nexus Dashboard Fabric Controller to perform VXLAN fabric-wide NX-OS upgrades successfully. (Video: 1:00:35)
This session offers an in-depth exploration of Cisco Smart Licensing, focusing on how it simplifies license activation and management for IOS XR devices. Attendees will learn about the registration and reporting requirements specific to Flexible Consumption Model devices, and the concepts of Smart Account and virtual accounts for centralized license management. The session will cover license usage monitoring, compliance status, license pooling, and the deployment process including ordering licenses, enabling Smart Licensing, and managing licenses through Cisco Smart Software Manager (CSSM).
Customers will learn how the latest Splunk AppDynamics controller releases provide a concise overview of recent updates. This webinar will demonstrate how these advancements empower them to optimize application performance, enhance user experience, and maximize their Splunk AppDynamics investment.
In the new era of borderless business, Newgen Software gears up against endpoint vulnerabilities with Cisco Secure Endpoint solutions and earmarks Cisco XDR for the future.
Join us to learn more about Cisco NX-OS software maintenance upgrades. Our experts will explain how to manage, upgrade, and downgrade your Nexus devices via CLI, as well as the benefits of doing it through Nexus Dashboard Fabric Controller. (Video: 50:13)
Join us as our experts walk you through the necessary steps for a smooth and successful upgrade of a Nexus Dashboard cluster and hosted apps such as Nexus Dashboard Insights. This session will provide you with important resources to prepare for your upgrade. (Video: 39:40)
The session provides information and the scope of health and configuration checks performed, walks you through the procedure to follow and get a health check report, helps you to review and understand the reports and take further action, and discusses frequently-asked questions. (Video: 40:50)
Leading global provider of crop inputs and services secures connectivity and employee safety with a platform approach built on Cisco networking solutions.
Modern workspaces are meant to deliver outcomes! If you would benefit from an IOT network for asset tracking, environmental monitoring, and occupancy insights; join us to learn how to manage and monitor your IOT network from Cisco Spaces.
Uncover how the latest capabilities in Cisco Secure Email Gateway strengthen your organisation’s first line of defense against advanced email threats. Harness AI-driven threat intelligence, advanced phishing and malware protection, and policy creations to safeguard business communications. Simplify administration, improve detection accuracy, and ensure uninterrupted email flow—all in one robust, trusted platform.
Explore enhanced notifications, customizable dashboards with widgets, and a deep dive into smart licensing—including how to apply licenses on servers and troubleshoot license sync issues.
Join our session for live demonstrations on best practices for deploying SSO using SAML 2.0, configuring authentication for various domains or user groups, and understanding key requirements for IdP integration. We’ll also showcase on managing users programmatically with Webex REST APIs, managing roles and licenses, and integrating Hybrid Data Security (HDS) for private encryption key management, enhanced security, and compliance.
Customers will explore Webex Common Identity’s key capabilities, including centralized user management, Single Sign-On (SSO) integrations with directory services (Azure EntraID, On-prem Directory Connector), domain claiming, automated onboarding, and an introduction to advanced identity and security features such as MFA, support for multiple IDPs, and social sign-in options (Google, MO365, Facebook, Apple ID).
In this session, learn about Cisco ACI Multi-Site and Multi-Pod control plane tuning, as well as data plane tuning. Our experts will help you understand ACI scale and software and hardware support. (Video: 43:10)
Join us as our experts walk you through improving performance by tuning the Cisco SD-WAN fabric operations by use case. At the end of this session, participants will gain the needed knowledge on recognizing performance issues and apply tuning best practices. (Video: 1:01:44)
Join us as our experts walk you through the insight and analytics of the Cisco SD-WAN using vAnalytics to gather insight into network performance and tuning requirements to increase user satisfaction and productivity. (Video: 53:48)
Join us as our experts walk you through Cisco's best practices on design options, general use case deployment guidelines and considerations, deployment phases and approaches. (Video: 54:40)
Join us as our experts walk you through the benefits of Events, APIs, and Integrations with Catalyst Center (Formerly Cisco DNA Center). Review best practices related to the planning stage, including design and compatibility requirements. (Video 49:50)
Join us as our experts walk you through how to use the Pre-Change Analysis feature in Nexus Dashboard Insights to understand the impact of configuration changes on ACI fabric before they are executed. You will learn how to verify the configuration intent before deploying policies into production fabric. (Video: 39:40)
Join us as our experts walk you through how to use the Pre-Change Analysis feature in Nexus Dashboard Insights to understand the impact of configuration changes on ACI fabric before they are executed. (Video: 39:40)
Join us as our experts walk you through the main value proposition of ThousandEyes along with key capabilities and common success metrics. Our experts will also explain ThousandEyes from a technical perspective and provide a practical value demonstration. (Video: 51:21)
Learn how to use Role Based Access Control in the context of the Image Management feature of NDFC. Our experts will walk you through best practices for leveraging RBAC to assign different roles to different user accounts and how that enhances auditability and security. (Video: 45:46)
To meet the diverse security needs of 57 school districts, ESC-17 wanted to simplify security management, and chose Cisco’s cloud-delivered security solution to achieve that goal.
Networking provider Lumen Technologies partners with Cisco to build metro routed optical networks that reduce latency and cost, simplifying cloud connectivity for AI.
SD-Access as Code allows for complete separation of data (defining variables) from logic (infrastructure declaration). With little to no experience with automation, users can instantiate network fabrics in minutes.
We gathered all the resources you'll need to successfully set up, install, and use SR-MPLS Enabled Network. These resources are meant for Cisco IOSXRSW.
Join us as our experts walk you through a secure application access with phishing resistant MFA. This session will help you identify prerequisites, define a testing methodology and go live with an application at high-level. (Video: 46:57)
The Public Cloud Security Access and Policy use case assists customers with planning and implementation of secure service edge (SSE) - providing fine-grained control of internet traffic and SaaS applications.
This playlist highlights how to use Cisco Secure Endpoint and APIs to boost threat hunting, automate incident response, and strengthen cybersecurity with Cisco XDR. (Video: 3:59)
This playlist overview highlights Cisco Identity Services Engine capabilities, covering how to secure guest access, implement device administration best practices, and ensure performance at scale—empowering organizations to strengthen network security through centralized policy enforcement. (Video: 1:41:21)
This playlist overview highlights Cisco Secure Access, showcasing how its cloud-delivered Security Service Edge (SSE) platform integrates Zero Trust Network Access (ZTNA), Secure Web Gateway (SWG), Cloud Access Security Broker (CASB), and Firewall-as-a-Service (FWaaS) to provide seamless, secure access to applications and resources from anywhere.
We gathered all the resources you'll need to successfully bridge the gap between intent and action for dynamic service delivery with Cisco Network Services Orchestrator.
To crack the North American market, SmartCap fully embraced automation. Having a rock-solid, easy-to-manage network and cameras became critical to its success.
"Transform your traditional office building into a dynamic, engaging experience that boosts productivity and collaboration. During this session we will see how to implement Cisco Spaces' smart workspaces interactive 3D maps and the room finder."
Learn about the critical role that software upgrades play in helping to mitigate risk due to defects and how they promote greater network stability. Our experts will share the Software Image Management capabilities that Nexus Dashboard Fabric Controller offers for Nexus devices. (Video: 51:24)
The streamlined experiences within Secure Endpoint, thoughtfully designed with extensive user input, address real-world challenges—especially as Talos IR trends from Q4 2024 reveal that "Over 25% of all incidents were impacted by misconfigured or missing EDR solutions." (Video: 52:29)
Learn more on the design concepts and dependencies for Cisco DNA Assurance along with the best practices for greenfield and brownfield deployments. (Video: 7:36)
Learn how to navigate through actions generated by Cisco Intersight Workload Optimizer. Also, learn how to execute these actions to start optimizing your application resources. (Video: 3:35)
Learn how to configure automation policies and set business rules to control how Cisco Intersight Workload Optimizer analyzes and allocates resources to your applications on demand. (Video: 3:55)
Learn how to get started using Network Hierarchy to organize your network infrastructure from a geographical and network requirements perspective. (Video: 7:56)
An increasingly volatile world presents new kinds of threats. Digital transformation is helping the UK Army outcompete its adversaries and improve operational efficiency
Join us as our experts demonstrate how the Smart Workspaces solution uses data from Meraki, Webex, Catalyst APs, and sensors to deliver real-time insights into building occupancy and air metrics through Cisco Spaces, including setup steps and key benefits. (Video: 48:21)
Join us as our experts walk you through the Smart Workspaces solution. This solution leverages information from Meraki, Webex, Catalyst APs, and other sensors to give you a dynamic and real-time picture of your building occupancy, air metrics, and other statistics, all within Cisco Spaces. (Video: 48:21)
In this video you can learn about Umbrella’s Secure Web Gateway (SWG), through deployment essentials, policy configuration, and best practices for adopting Umbrella’s cloud-based full-proxy web filtering solution. (Video: 2:45)
In this quick lesson, learn about the Umbrella Module for Cisco Secure Client (Android), how it protects your environment, and what its features are. This course will cover deploying the client and basic troubleshooting. (Video: 2:02)
This playlist overview highlights Umbrella’s Cloud-Delivered Firewall features—covering how to set up and manage firewall policies in the cloud to protect your network and control internet traffic effectively.
This playlist overview highlights Umbrella’s Data Loss Prevention (DLP) policy capabilities—showcasing how to define real‑time and SaaS API rules, configure discovery scans, and leverage unified reporting to protect sensitive data across web and cloud environments.
Using Investigate's Smart Search or Pattern Search tools, this course will review all the details generated by your search and what to do with that information.
This playlist overview highlights Cisco Web Policy, including teaching users how to create and test web policy configurations—including rulesets, rules, policy testing, identities, actions, and reporting.
Join us for an insightful webinar designed to help you maximize the value of Orbital within your organization. Discover how Orbital’s robust capabilities can drive your business forward by aligning seamlessly with your key performance indicators (KPIs) and optimizing your operational processes.
<p>Learn more about the latest release for Cisco Secure Firewall which includes enhanced network security, and streamlined management with advanced threat intelligence and machine learning to proactively mitigate threats.</p>
Learn more about the latest release for Cisco Secure Firewall which includes enhanced network security, and streamlined management with advanced threat intelligence and machine learning to proactively mitigate threats.
Join us as our experts walk you through the Cisco ACI upgrade process. The session will cover preparation steps, troubleshooting, and validating the ACI fabric upgrade. (Video: 1:04:11)
Join us as our experts walk you through Meraki firmware upgrade best practices. Learn about features and tools that simplify the firmware upgrade process. (Video: 44:17)
Learn about the key concepts and considerations involved in a successful Cisco ACI fabric upgrade using Nexus Dashboard Orchestrator. This session will also cover best practices to keep in mind when upgrading an ACI site. (Video: 47:06)
Join us as our experts walk you through Cisco SD-WAN Multicloud Connectivity use case concepts and customer alignment, use case prerequisites, and deployment steps. This session will also include a demonstration of key features. (Video: 56:01)
Join us as our experts walk you through an overview of ThousandEyes use cases. It helps you understand the key activities required to enable the business capabilities and also create an actionable plan to move forward. (Video: 51:01)
Join us to learn how Nexus Dashboard Fabric Controller enables VXLAN EVPN fabric provisioning and operations. Our experts will also review guidelines to determine general and specific success metrics. (Video: 53:21)
This session on XR FCM - SIA license utilization monitoring provides comprehensive insights into managing and optimizing license usage for Cisco IOS XR devices. It covers understanding router licensing states and registration status, utilizing Smart Software Manager (SSM) alerts, inventory, and integrated reporting features.
Attendees will go through practical examples of license compliance monitoring, filtering license data, and the importance of maintaining license compliance and monitoring reserved licenses will also be discussed.
Using Microsegmentation, you can divide the data center into distinct security segments and define security controls for each segment, down to the singular workload level.
Join us as our experts walk you through using vAnalytics to gather insight into network performance and tuning requirements with the goal of increasing user satisfaction and productivity. (Video: 47:03)
Join our product management experts for a live webinar where we will demystify the ZTA deployment process. We will provide a practical, step-by-step blueprint that takes you from initial planning to full implementation. You'll learn how to leverage powerful, built-in tools to streamline configuration and enforce granular, context-aware security for your private applications. In this session, you will learn how to discover the private applications your users are accessing to eliminate guesswork, deploy resilient Resource Connectors for secure, high-availability connectivity to your data centers and VPCs, Choose the right access method - client-based or client-less - to balance security and user experience for every role, and apply the principle of least privilege to build effective access policies that protect your critical resources. This webinar will provide you with the expert guidance and best practices needed for a successful deployment.