Einträge von Technik Support

New Cisco AnyConnect Network Visibility Module App for Splunk

By Vinny Parla Users on the network are an important layer of an organization’s security strategy – and a particularly vulnerable one. In fact, a recent IBM cybersecurity report found that human error was a contributing factor in 95% of all security incidents! It is critical to know what users are doing on the network, […]

New Cisco AnyConnect Network Visibility Module App for Splunk

By Vinny Parla Users on the network are an important layer of an organization’s security strategy – and a particularly vulnerable one. In fact, a recent IBM cybersecurity report found that human error was a contributing factor in 95% of all security incidents! It is critical to know what users are doing on the network, […]

Update for Customers

By Anthony Grieco Following a recent Juniper security bulletin discussing unauthorized code, we have fielded a number of related questions from our customers. Being trustworthy, transparent, and accountable is core to our team, so we are responding to these questions publicly. First, we have a “no backdoor” policy and our principles are published at trust.cisco.com […]

Update for Customers

By Anthony Grieco Following a recent Juniper security bulletin discussing unauthorized code, we have fielded a number of related questions from our customers. Being trustworthy, transparent, and accountable is core to our team, so we are responding to these questions publicly. First, we have a “no backdoor” policy and our principles are published at trust.cisco.com […]

Threat-Focused NG-Firewall – Who Cares? Part 3

By Mike Storm This is Part 3 of our blog series about NG-Firewalls. See Part 1 here . Part 3: Challenges of the Typical NGFW What good is a malicious verdict on something that had already penetrated the system? There is no system in the world that can stop 100% of attacks/attackers 100% of the […]

Threat-Focused NG-Firewall – Who Cares? Part 3

By Mike Storm This is Part 3 of our blog series about NG-Firewalls. See Part 1 here . Part 3: Challenges of the Typical NGFW What good is a malicious verdict on something that had already penetrated the system? There is no system in the world that can stop 100% of attacks/attackers 100% of the […]