Overview
Explore
Labs
Services
Events
Partners
15 results found
Cisco ISE 802.1x with Cisco Secure Access by Duo MFA
Improving security posture by enforcing strong authentication methods . This scenario utilizes Cisco Secure Access by Duo for Multiple Factor Authentication (MFA) in a Cisco Identity Services Engine (ISE) 802.1x environment.
Video
• 4:01
• Oct 16, 2022
Cisco Secure Edge (Umbrella) SIG Integration With Cisco SD-WAN
Cisco Secure Edge (formerly Umbrella) provides DNS-layer security, secure web gateway (SWG), cloud-delivered firewall, and cloud access security broker (CASB) in a single, cloud-native, security platform. Cisco Secure Edge can be seamlessly integrated into Cisco SD-WAN using feature and device templates in vManage. This integration with SD-WAN gives you the ability to rapidly deploy Umbrella SIG services to hundreds or thousands of remote office locations throughout the world. With Cisco Secure Edge and SD-WAN you can create a global scale secure access fabric that is highly available!
Video
• 4:57
• May 29, 2023
Cisco Secure Edge (Umbrella) DNS Security Integration With Cisco SD-WAN
Traditional methods of backhauling Internet-bound traffic from branches to a data center for traditional security services is expensive and latency intensive. Many organizations are improving their network infrastructure by adopting a SASE (Secure Access Services Edge) architecture. Cisco SD-WAN and Cisco Secure Edge (formerly Umbrella) SASE integrations give organizations the ability to leverage cloud-delivered security in minutes. This demonstration is designed to give an overview of the integration between Umbrella DNS Layer Security and Cisco SD-WAN.
Video
• 6:42
• Oct 7, 2024
Partner POV | Zero Trust in 5 Minutes
VPNs can never be zero trust because they typically grant broad network access to users, and well, users on the network are a recipe for disaster. Discover why Zscaler's inside-out zero trust married to identity helps enforce true user-to-application zero trust without exposing an attack surface and keeping the users off the network.
Video
• 4:38
• Sep 3, 2024
Cisco ACI Segmentation Migration Video
Implementing an application-centric mode to specifically meet a segmentation strategy and zone architecture requires a different approach — one referred to as the hybrid model.
Video
• 19:21
• Jan 10, 2023
Dive Into the Mind of the 'Father of Zero Trust' John Kindervag | Meet the Chief
Zero trust has taken the cybersecurity industry by storm, creating hype, misunderstanding and confusion. What does zero trust actually mean? And how can you adopt it?
Who better to answer those questions than the creator of zero trust, John Kindervag, who joined our latest episode of Meet the Chief to talk about the story behind developing this seminal security strategy over a decade ago and how it has evolved to address modern threats. John also discusses the importance of segmentation in establishing a zero trust foundation and provides valuable insights for security leaders looking to strengthen their zero trust posture and stay ahead of constantly changing adversaries.
Video
• 0:54
• Jul 16, 2024
Authentication in a Zero Trust Framework
Matt Berry, WWT's Global Field CTO of Cybersecurity, shares how you can reduce risk, cost and complexity with authentication in a zero trust framework.
Video
• 16:19
• Apr 7, 2023
Securing Application Access With Fortinet Zero Trust Network Access
The Internet is the new perimeter and nothing should be trusted until verified. View how to achieve simple, automatic secure remote access that verifies who and what is on your network and secures application access no matter where users are located with Fortinet Zero Trust Network Access (ZTNA).
Video
• 2:28
• May 17, 2023
Partner POV | Redefining Cyber Risk Quantification (CRQ) with Zscaler's Risk360
Risk360 is streamlined Cyber Risk Quantification solution that simplifies assessing potential financial losses and adverse impacts from cyber threats. With RIsk360, evaluate the likelihood of cyber incidents, their potential organizational impact, and the effectiveness of existing cybersecurity measures effortlessly. Prioritize investments and make informed decisions to manage and mitigate cyber risks effectively.
Video
• 11:34
• Sep 6, 2024
Zscaler Data Protection Platform with Brian Deitch
Get ready to explore the future of data protection, where we embrace a cloud-native approach enhanced by the capabilities of machine learning. Completely managed efficiently through a single DLP policy, enforcing security in motion, at rest, and at the endpoint.
Video
• 12:01
• Sep 3, 2024
Demystifying Zero Trust: Navigate the Journey One Step at a Time
In a digital landscape fraught with sophisticated cyber threats, traditional security models fall short in providing adequate protection.
Video
• 25:26
• Nov 30, 2023
Enable Zero Trust with Akamai
Today's enterprises are benefitting from the Zero Trust security model. Learn how you can enable Zero Trust with Akamai.
Video
• 0:24
• Apr 27, 2023