ComputerWeekly.com Research Library

Powered by Bitpipe.com

All Research Sponsored By:Cisco

  • Why XDR Matters

    Megatrends including XDR are critical innovations that are helping security leaders strengthen and grow their programs. Learn by XDR matters and how to implement XDR in your organization by reading this exclusive Enterprise Strategy Group white paper.

  • XDR Buyer’s Guide

    With threats becoming increasingly sophisticated, the old detection and response model built upon self-contained point security solutions doesn't go far enough. Read the full buyer’s guide to learn how to navigate the XDR market like a pro.

  • Navigating Emerging Threats Insights for Security Leaders

    In today’s ever-evolving digital landscape, emerging threats present a constant challenge for organizations striving to maintain robust cybersecurity. To effectively protect against these threats, security leaders must be equipped with the knowledge and strategies necessary to prepare and defend their organizations. View to learn more.

  • Simplifying Security Operations with XDR

    Cyberattacks are a growing threat to America, with growing infrastructure echoing the urgency in safeguarding the security of State, Local and Education (SLED) entities. Fortunately, a new generation of extended detection and response (XDR) tools, like Cisco's XDR solution, help the challenges faced by SLED organizations.

  • Cisco XDR: Security Operations Simplified

    This new e-book provides valuable insights into the growing need for extended detection and response, and the open approach Cisco takes. You'll read how Cisco correlates multiple sources of telemetry and threat intel to detect and prioritize threats effectively, streamline investigations, and remediate threats rapidly.

  • XDR, 2nd Cisco Special Edition

    Extended Detection and Response (XDR) For Dummies, 2nd Cisco Special Edition, explores the various types of threat detection and provides considerations for using a comprehensive approach to XDR. Learn how the Cisco approach to XDR can deliver strong levels of protection while simplifying the experience for your security team.

  • 5 Ways to Experience XDR

    Discover how an XDR approach brings data from multiple security tools, applies analytics to arrive at correlated detections, and enables remediation actions to mitigate threats effectively in any environment. Read the e-book to learn more.

  • Advanced Email Threats, Cisco Special Edition

    From this “for Dummies” eBook you’ll take away a better understanding of the broad range of security challenges associated to email accounts and how organizations can prevent and respond effectively to today’s most advanced email threats.

  • The Evolution of Complex Threats Defining a Modern and Sophisticated Threat and What that Means for Your SOC

    Tune into this webinar to learn from Cisco about what new, modern and sophisticated threats look like today, and how these complex threats make it harder to succeed at effective threat detection and response.

  • A New Perspective on SSE Requirements and Expected Outcomes

    Security service edge (SSE) is a game-changer for cybersecurity. Join this exclusive webinar to gain expert insights from Enterprise Strategy Group and find out how you can use SSE to improve your security posture while providing a better user experience and simplifying IT processes.

  • How the SASE Architecture Enables Remote Work

    By implementing an innovative SASE architecture, organizations can streamline cybersecurity efforts and improve security resilience. Join this session to discuss trends and challenges in the industry and how Security Service Edge (SSE) and Secure Access Service Edge (SASE) architectures offer crucial safeguards.

  • Security Service Edge (SSE) from Cisco in 15 minutes

    Security leaders need a smarter way to manage access while protecting against savvy, sophisticated attackers. Security Service Edge (SSE), the security portion of Secure Access Service Edge (SASE), is the architectural approach needed to lower risk in decentralized, hybrid work environments. View this webinar to learn about SSE and more.

  • Zero Trust Network Access

    Download this KuppingerCole report to find out how ZTNA can enhance your security strategy, reduce risk against advanced threats, and strengthen your security posture for hybrid work.

  • IDC Spotlight Looking to Deliver on the Promise of Security Service Edge

    This IDC Spotlight report covers the capabilities of security service edge technology, how it can improve productivity and user experience, and the ways that it solves modern security challenges. Read on to access the analyst insights.

  • Breach Protection Infographic

    Dive into this infographic to understand how Cisco Breach Protection Suite empowers security teams to simplify operations and accelerate incident response across the most prominent attack vectors including email, endpoints, network, and cloud environments.

  • Gartner Emerging Tech Top Use Cases for AI in Threat Detection, Investigation and Response

    Read this Gartner report to ascertain top use cases for AI in the Threat Detection, Investigation and Response process; view 4 recommendations from Gartner analysts; and understand how to responsibly apply AI in your organization.

  • 2024 Global Networking Trends Report

    This report examines the changing networking landscape, focusing on architecture evolution, security integration, AI operations, data center updates, and sustainability. Discover how AI-driven networks can streamline operations, bolster security, and promote digital resilience. Access the full report for essential insights.

  • XDR and the Benefits of Managed Services

    Join this exclusive webinar interview with ISMG as Port53 Technologies President Omar Zarabi discusses the evolution of XDR and the new benefits brought by managed services.

  • Port53 Managed Detection & Response Powered by Cisco XDR

    In this product overview, discover how Port53 Native and Open XDR Functionality Extended Detection and Response looks at the entire architecture rather than just the endpoint, helping you establish a new security front for today’s threats—instead of just papering over the cracks.

  • The Future of Security Operations

    In this e-book, discover why the threats of tomorrow require a dynamic approach to the SOC of today, and find out how your security strategy to start evolving past traditional security measures.

  • Cisco AI Readiness Index

    Download this e-book, the Cisco AI Readiness Index, to investigate how you can evaluate your organization’s AI potential by examining the 6 key pillars of AI readiness.

  • Marriott Leads the Hospitality Industry in the Fight Against Online Child Exploitation

    Seeing value in Cisco Umbrella’s cloud-delivered DNS-layer security during a pilot, Marriott rapidly deployed Umbrella to nearly 5,000 properties throughout U.S. and Canada. Discover how Cisco has helped Marriott to take a stand against illegal online activity and to provide its guests with safer Wi-Fi connections.

  • Qdoba Cisco Testimonial

    Qdoba Mexican Eats is connected and protected by Cisco Secure. Hear Gary Burgess, Director of Infrastructure and Security at Qdoba, discuss how a SASE solution that combines Cisco Umbrella cloud-delivered security and Meraki’s cloud-managed networking keeps connectivity reliable and secure.

  • Phishing Cisco Special Edition

    Protecting yourself and your business from phishing attacks can be a daunting task. While it's impossible to eliminate all risk, there are steps you can take to reduce the odds and your brand. Enter "Phishing for Dummies" – the definitive guide for IT professionals seeking comprehensive knowledge and defense against phishing attacks.

  • U.S. FTC Safeguards Rule

    The Safeguards Rule requires mitigation of “reasonably foreseeable internal and external risks” - in other words, protection against data breaches, data leakage, phishing, and ransomware. Learn how Cisco Umbrella supports compliance in this white paper.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.