UPDATE – Corona-Tipps für Unternehmen

In Zeiten, in denen viele Unternehmen und Mitarbeiter verunsichert sind, oder über Notfallpläne im Falle einer Quarantäne nachdenken, haben wir ein paar Corona-Tipps für Unternehmen zusammengestellt, die das dezentrale Arbeiten vereinfachen und sicher gestalten: UPDATE 26.03.2020: Unser Partner G DATA stellt drei kostenfreie Trainings zum Thema „Sicher arbeiten im Home-Office“ bereit. Eine Registrierung ist hier […]

As the Number of Remote Workers Rises, Cisco Supports Customers with Expansion of Free Security Offerings

By Dr. Gee Rittenhouse Helping employees, customers and partners in a time of need is one of Cisco’s core values. Right now, COVID-19 is forcing many people around the world to work remotely. This is putting a sudden strain on both IT and security teams who are being tasked with providing support for an unprecedented […]

Support:App Platform build 90007 available

Source:: Innovaphone

Cisco Identity Services Engine wins…again!

By Paul Burdette Last week, for the fourth time in the last five years, Cisco Identity Services Engine (ISE) was recognized as the top solution in the Trust Awards category for Best NAC Solution at the 2020 SC Awards. The announcement was made on Tuesday, February 25, 2020 during the 24th annual SC Awards gala […]

Threat Roundup for February 28 to March 6

By Talos Group Today, Talos is publishing a glimpse into the most prevalent threats we’ve observed between Feb 28 and Mar 6. As with previous roundups, this post isn’t meant to be an in-depth analysis. Instead, this post will summarize the threats we’ve observed by highlighting key behavioral characteristics, indicators of compromise, and discussing how […]

Enforce Endpoint Compliance and Cyber Hygiene With Duo Device Trust

By Ganesh Umapathy Cisco’s recently released their 2020 CISO Benchmark Report that makes several key recommendations for security professionals to achieve a zero trust vision. The following are a couple of recommendations that are relevant to the discussion in this blog regarding device trust: More than half (52%) of the respondents said that mobile devices […]

Starting Your Microsegmentation journey

By Christina Hausman One of the key challenge’s businesses face is how to provide a secure infrastructure for applications without compromising agility. With the rise of cloud usage, containers, and microservices, many companies choose microsegmentation as the means to protect critical applications from compromise. Choosing a proactive approach to security to build upon their existing […]