OpenDNS Introduces IP-Layer Enforcement for Umbrella

By Owen Lystrup Cisco announced on Tuesday that OpenDNS was updating its cloud-delivered network security and threat intelligence solutions, as part of the company’s strategy to provide Security Everywhere across the extended network. Acquired in August, OpenDNS handles nearly 80 billion daily DNS requests and uses its unique view of the Internet to extend security for an increasingly mobile and off-network workforce. Umbrella, OpenDNS’s cloud-delivered network security solution, already provides advanced threat protection for any device, anywhere, anytime. Umbrella encrypts DNS requests from endpoints []

Source:: Cisco Security Notice

Reverse Social Engineering Tech Support Scammers

By Talos Group This post is authored by Jaime Filson and Dave Liebenberg . Background The amount of fraudulent actors masquerading as legitimate tech support has been on the rise since 2008. According to David Finn , executive director at the Microsoft Cybercrime Center, tech support scammers have made nearly $1.5 billion off of 3.3 million unwitting victims just this year. These scammers typically convince the victim into allowing them access to his/her computer through remote control applications such as TeamViewer. They then present benign processes as malicious, or at times even []

Source:: Cisco Security Notice

Reverse Social Engineering Tech Support Scammers

By Talos Group This post is authored by Jaime Filson and Dave Liebenberg . Background The amount of fraudulent actors masquerading as legitimate tech support has been on the rise since 2008. According to David Finn , executive director at the Microsoft Cybercrime Center, tech support scammers have made nearly $1.5 billion off of 3.3 million unwitting victims just this year. These scammers typically convince the victim into allowing them access to his/her computer through remote control applications such as TeamViewer. They then present benign processes as malicious, or at times even []

Source:: Cisco Security Notice

ISE 2.0 Extends Greater Visibility, Usability and Control

By Dan Stotts More employees need access to more enterprise resources from more devices than ever, and attacker ingenuity and persistence have reached new heights. As a result, organizations are losing sight of who and what is accessing the network – and the threats that may take hold. And the problem is only going to grow as 500 billion new devices are expected to be connected to the network by 2030. How can you protect what you can’t see? In the face of []

Source:: Cisco Security Notice

ISE 2.0 Extends Greater Visibility, Usability and Control

By Dan Stotts More employees need access to more enterprise resources from more devices than ever, and attacker ingenuity and persistence have reached new heights. As a result, organizations are losing sight of who and what is accessing the network – and the threats that may take hold. And the problem is only going to grow as 500 billion new devices are expected to be connected to the network by 2030. How can you protect what you can’t see? In the face of []

Source:: Cisco Security Notice

Save money with branch security

By Jason Liu Trends like bring-your-own-device, mobility, and cloud computing are creating a surge in the number and types of devices connecting to the network and driving demand for WAN bandwidth. Remote and branch office employees expect fast, secure connectivity but most enterprises don’t have spare operational budget to increase their WAN bandwidth to backhaul all traffic to headquarters in order to keep it secure. Enter Intelligent WAN, or IWAN. With IWAN, the Internet becomes a reliable, cost-effective way to supplement the WAN. []

Source:: Cisco Security Notice

Save money with branch security

By Jason Liu Trends like bring-your-own-device, mobility, and cloud computing are creating a surge in the number and types of devices connecting to the network and driving demand for WAN bandwidth. Remote and branch office employees expect fast, secure connectivity but most enterprises don’t have spare operational budget to increase their WAN bandwidth to backhaul all traffic to headquarters in order to keep it secure. Enter Intelligent WAN, or IWAN. With IWAN, the Internet becomes a reliable, cost-effective way to supplement the WAN. []

Source:: Cisco Security Notice

Cisco pxGrid Caps First Year in Market with Nine New Ecosystem Partners and More Security Standards Work

By Scott Pope An often overused yarn of our day is that “we live in an increasingly more connected world.” While overused, I can’t think of any better way to describe what Cisco is doing in our security ecosystem with Cisco Platform Exchange Grid (pxGrid). And it has been quite an active first year since release of pxGrid for use in customer deployments, from building an ecosystem of 30 partners to work in multiple security standards groups in the IETF. Cisco pxGrid is []

Source:: Cisco Security Notice

Cisco pxGrid Caps First Year in Market with Nine New Ecosystem Partners and More Security Standards Work

By Scott Pope An often overused yarn of our day is that “we live in an increasingly more connected world.” While overused, I can’t think of any better way to describe what Cisco is doing in our security ecosystem with Cisco Platform Exchange Grid (pxGrid). And it has been quite an active first year since release of pxGrid for use in customer deployments, from building an ecosystem of 30 partners to work in multiple security standards groups in the IETF. Cisco pxGrid is []

Source:: Cisco Security Notice

Extending Security Everywhere

By Scott Harrell Just a few months ago at Cisco Live U.S., we announced both our strategy and several new offerings for Security Everywhere Across the Extended Network . We believe that our vision of delivering Security Everywhere – from the cloud to the network to the endpoint – is essential to reduce risk, gain competitive advantage and make security a growth engine for organizations. Today we are extending Security Everywhere with new capabilities and services that deliver greater visibility, context and control from the cloud to the network []

Source:: Cisco Security Notice