Category: Security

Security Luncheon Seminar – The New Security Model: Before, During, and After an Attack – NY, NY Lunch Maloney & Porcelli – 9/29, 11-2

In the real world, it's no longer a matter of “if” an attacker will get in, but “when.” Security professionals need to evolve their strategy from a point-in-time approach to a continuous model that addresses the full attack continuum before, during and after an attack.

BEFORE: You can't protect what you can't see. To defend against threats you need complete visibility of devices, operating systems, services, files, applications, users, vulnerabilities and more. How can you establish policies and controls across your network, applications and users without total visibility?

DURING: Advanced threats require advanced threat detection. Do you find yourself having to choose between performance and flexibility as you try to stop exploits, hackers, and other intrusions and attacks?

AFTER: Invariably attacks will be successful. Can you identify the point of entry, determine the scope of the damage, contain the event, remediate the issue and bring operations back to normal as quickly as possible?

In this free luncheon seminar we'll:
-Learn how Cisco research and development along with strategic acquisitions enhance and strengthen the overall security portfolio.
-Explore the Cisco approach to cybersecurity that is visibility-driven, threat-focused and platform-based
-Perform live attack demos that illustrate solutions to real-world problems
-Discuss the innovation of Cisco's security solutions from investments to acquisitions

Read more

Cisco Security: Your Best Line of Defense Before an Attack  – Fri, 8/14 – 10am webex

usinesses of all sizes have advanced threat protection needs. And with the evolving trends of mobility, cloud computing, and the Internet of Everything, sophisticated cybercriminals are continually searching and exploiting new gaps in security.

You need a smart, scalable threat-centric security solution to protect your business across the entire attack continuum—before, during, and after an attack. Join us for a webinar to learn how Cisco can help your business boost protection before an attack occurs.

You'll hear about the Cisco approach to security and watch engaging product demonstrations on:

Cloud-managed options and benefits using our Cisco Meraki MX Unified Threat Management solutions
On-premises options and benefits using our new Cisco ASA 5500 Series Next-Generation Firewalls that were tailored specifically for the midmarket
Strengthen your first line of defense against attackers with integrated threat defense, low procurement and operating costs, and simplified security management options today.

Join us from the comfort of your desk live via Cisco WebEx!

Read more

“Security Everywhere” – Enterprise Branch Security for Direct Internet Access and IWAN

Cisco Blog Two weeks ago, a leading global medical device manufacturer came to Cisco for advice. In an effort to streamline IT operations and reduce operating costs, the customer had recently migrated from their internal Microsoft Exchange 2010 environment to Office365, Microsoft’s hosted online service. The migration was initially done for the headquarter users and …

Read more

Cisco Securtiy @ LIve / Resources

Security Everywhere! Check out the latest on all Cisco Live! Security updates at — http://wwwin.cisco.com/marketing/borderless/security/cLive2015.shtml#tab=0   Security Customer Community Security Partner Community Blogs   Welcome to the Security & Enterprise Segment Joint Launch at Cisco Live US 2015 site. Watch theInternal Launch replay via Cisco TV to learn about Security Everywhere; embedded Security across the extended network. …

Read more

Save Your Network – Protecting you Data From Deadly Breaches – Lancope – Thursday, June 25, 2015, 1pm EST (webinar)

REGISTER NOW Thursday, June 25, 2015 1:00 PM ET/ 10:00 AM PT/ 6:00 PM GMT As recent events have proven, healthcare organizations are especially vulnerable to cyber-attacks due to the amount of valuable data they maintain. With advanced attacks becoming so ubiquitous, how can healthcare organizations protect patient data and avoid becoming the next high-profile …

Read more

Understanding FirePower Key Differentiators – Security Architecture Diagram

Through this diagram, you'll see how integrated and strategic Talos is to our overall security architecture (FirePower NGIPS, AMP, Threatgrid, FireSight) and this DIFFERENTIATES Cisco from other vendors. The combination of feeds from the open source sensor community, analysis and dynamic integration sets us apart and is the most effective defense against an ALWAYS CHANGING attack landscape.

You can zoom at the bottom of the PDF.

Read more