Celebrating 40 Years of Impact
EBOOK:
Cisco's FY24 Purpose Report highlights 40 years of impact, including powering inclusive connectivity, advancing responsible AI, and driving sustainability. Download the report to learn about new technological initiatives and discover what comes next.
Posted: 20 Dec 2024 | Published: 20 Dec 2024
|
|
2024 State of Industrial Networking Report for Utilities
ANALYST REPORT:
This report reveals how utility firms are enhancing performance, security, and innovation through operational technology. Key findings include the importance of IT/OT collaboration, increased cybersecurity investment, and AI's potential in industrial networking. Read the full Analyst Report to future-proof your utility's OT infrastructure.
Posted: 12 Dec 2024 | Published: 12 Dec 2024
|
|
Kubernetes Networking and Cilium
EBOOK:
Kubernetes networking can be daunting, even for seasoned network engineers. This e-book provides a detailed instruction manual on Kubernetes networking fundamentals, Cilium, and advanced features like load balancing, security, and observability. Download the e-book to master Kubernetes networking.
Posted: 07 Dec 2024 | Published: 07 Dec 2024
|
|
Kubernetes Traffic Engineering for Network Engineers: Cilium Best Practices
EBOOK:
Traffic engineering in Kubernetes optimizes network performance, security, and costs. This paper explores using Cilium, a leading cloud-native networking solution, for advanced traffic routing in Kubernetes. Learn techniques for managing traffic flows. Discover how to build a resilient, high-performance Kubernetes network.
Posted: 07 Dec 2024 | Published: 07 Dec 2024
|
|
How to Build a Secure Financial Services Platform
EBOOK:
Secure your financial services platform with advanced networking, security, and observability features. Learn how Cilium and Tetragon can help you reduce risk, maintain compliance, and build a future-proof infrastructure. Read the full Product Overview.
Posted: 07 Dec 2024 | Published: 07 Dec 2024
|
|
Mastering Cilium for Kubernetes Compliance
EBOOK:
Cilium simplifies Kubernetes compliance with advanced networking, security, and observability features. Learn how Cilium addresses NIST 800-53 and 800-190 controls for access control, auditing, and incident response in this white paper.
Posted: 07 Dec 2024 | Published: 07 Dec 2024
|
|
Shortening Time To Value With Isovalent Enterprise For Cilium Support
PRODUCT OVERVIEW:
Isovalent offers enterprise support for Cilium, the cloud-native networking solution. Their hardened distribution, 24/7 support, and customer testing environments help enterprises maximize Cilium's benefits and minimize time to value. Learn more about Isovalent's enterprise support for Cilium.
Posted: 07 Dec 2024 | Published: 07 Dec 2024
|
|
How To Enable Revolutionary Host-Based Kubernetes Visibility!
PRODUCT OVERVIEW:
Gain deep visibility into your Kubernetes environment with Tetragon's host-based observability. Easily map network traffic to specific processes, even across containers and nodes, for enhanced security and compliance. Learn more by reading the full white paper.
Posted: 07 Dec 2024 | Published: 07 Dec 2024
|
|
Building an Identity Security Program
WHITE PAPER:
This e-book provides a blueprint for CISOs to build an effective identity security program. Learn about the four pillars of identity security, key business outcomes, and performance indicators to measure success. Download the e-book to secure your workforce identities and keep your organization safe.
Posted: 09 Nov 2024 | Published: 09 Nov 2024
|
|
Zero Trust – Simplified Discover Seamless, Customizable, Secure Access Management With Cisco Duo And Microsoft
WHITE PAPER:
Discover how Cisco Duo and Microsoft can help you implement a seamless zero trust security model that secures remote access and enables productivity in a hybrid work environment. Learn more by reading the full White Paper.
Posted: 09 Nov 2024 | Published: 09 Nov 2024
|
|
How Attackers Steal Credentials To Gain Sealth Access
WEBCAST:
Access is a key resource in the battle for organizational cybersecurity. In this webcast, Cisco Talos experts, Bill Largent, Hazel Burton, and Ted Kietzman, come together to discuss identity threats, as well as how attackers steal credentials to gain stealth access. Watch now to learn more.
Posted: 12 Sep 2024 | Premiered: Sep 12, 2024
|
|
Securely Moving to the (Government) Cloud to Email
WEBCAST:
For any organization involved in the government cloud ecosystem, security is nonnegotiable. In this webcast, SANS analyst and instructor, Matt Bromiley, joins Cisco Technical Marketing Engineer, Christian Clasen, to discuss how you can securely move your government cloud to an email platform. Watch now to learn more.
Posted: 10 Sep 2024 | Premiered: Sep 10, 2024
|
|
Domain Name System (DNS) Security
GARTNER RESEARCH REPORT:
SRM leaders must fully understand the FedRAMP program, its security levels, and the authorization process to make informed cloud security decisions. Verify CSP FedRAMP status and ask probing questions. Remember that using a FedRAMP-authorized cloud does not absolve security responsibilities. Read the full Gartner Research Report to learn more.
Posted: 07 Sep 2024 | Published: 07 Sep 2024
|
|
Cyber Threat Trends Report: From Trojan Takeovers to Ransomware Roulette
RESEARCH CONTENT:
The 2024 "Cyber Threat Trends Report" by Cisco analyzes the threats crowding the cyber landscape, including information stealers, Trojans and ransomware. It also provides insights on how DNS security can help defend your organization against those growing threats. Read the 18-page report to unlock the full insights.
Posted: 07 Sep 2024 | Published: 12 Sep 2024
|
|
GigaOm Radar for Domain Name System (DNS) Security
ANALYST REPORT:
The domain name system (DNS) is essential yet vulnerable. This GigaOm Radar report examines 11 leading DNS security solutions, evaluating their capabilities to help you secure your network and mitigate DNS threats. Read the full report to find the right DNS security solution for your organization.
Posted: 07 Sep 2024 | Published: 07 Sep 2024
|
|
The 2024 Duo Trusted Access Report
RESEARCH CONTENT:
The security frontier is constantly shifting in response to the back and forth between hackers and security teams. Today, access management is the front line of this battle.In this report, Cisco dive into insights drawn from an analysis of over 16 billion authentications in the last year. Read on to learn more.
Posted: 06 Sep 2024 | Published: 06 Sep 2024
|
|
Securely Moving to the (Government) Cloud
ANALYST REPORT:
It’s no secret that FedRAMP compliance is the staple of government cloud operations. This SANS white paper examines the security requirements of cloud-based resources as well as how you can best position your agency for that transition. Download and read the SANS white paper now to learn more.
Posted: 06 Sep 2024 | Published: 06 Sep 2024
|
|
5 Critical Security Callouts to Know in 2024
INFOGRAPHIC:
Cisco conducted a survey and compiled the results in their 2024 Duo Trusted Access Report, which evaluates the new frontier for access management and identity security. Gain an understanding of the top 5 most important takeaways from the report in this infographic.
Posted: 09 May 2024 | Published: 09 May 2024
|