Cisco Adds New Security and AI Capabilities in Next Step Toward Cisco Networking Cloud Vision

PRESS RELEASE. AMSTERDAM, Feb. 6, 2024 /PRNewswire/ - CISCO LIVE EMEA - Cisco, the leader in networking and security, today introduced new capabilities and technologies across its networking portfolio that are designed to drive a more unified and integrated approach to managing and securing customer networks.
IT organizations are looking to their technology providers to help address three core priorities in their network operations: security, automation, and a unified digital experience for their end users, things and applications.
Users require a secure networking solution that delivers a shared view across their entire network, and a scalable way to enforce security policies everywhere, without compromising their always-on, optimized user experience.
New Integrations with Cisco Secure Access: Highlighting Cisco's commitment to provide customers with the tools to bring networking and security teams closer together, Cisco is introducing deeper integrations between Cisco Networking and Security Cloud platforms.
These innovations with Cisco Secure Access, Cisco's Secure Services Edge solution, deliver a unified approach to networking and security management, and automated monitoring of the digital experience, providing insights from network, device and application performance metrics.
These integrations are available today with Cisco Catalyst SD-WAN and ThousandEyes.
Enhanced security posture reporting for OT assets: Industrial organizations can now utilize the Security Posture report for comprehensive details on OT asset inventories, top vulnerabilities and highest cyber risks to help reduce the attack surface.
These features are available with Cisco Cyber Vision and available as part of our hardened industrial-grade routers, switches, and firewalls.
Cloud Monitoring for Catalyst Wireless: First introduced as a capability for Catalyst switching, customers can now view and manage select Catalyst wireless devices in the Meraki dashboard.
This new capability gives Cisco customers a complete, cloud-managed view of their access networks.
Catalyst 9300-M Cloud-Managed Switch Models: Cisco is continuing its journey to a single, unified hardware architecture with the new Catalyst 9300-M switches which will be managed natively from the Meraki dashboard.
This is the first step in the evolution towards full cloud management for the Catalyst switching portfolio.
Cisco is also unveiling new technologies to help customers accelerate the adoption of AI by providing the right infrastructure for the right use cases.
Cisco UCS X-Series Direct: An extension of Cisco's industry-leading and award winning UCS X-Series Modular System, the new Cisco X-Series Direct is built for environments where customers need connectivity and compute power at the edge to support more applications with less infrastructure.
Cisco AI Validated Designs: Cisco is expanding its offering of converged and hyperconverged validated designs addressing new use cases, leveraging recently announced Cisco Validated Solutions and AI/ML blueprint for data center networks.
These designs can accelerate AI/ML deployments and minimize risks by helping customers build high performance compute and data center network fabrics with automation and visibility tailored for a variety of AI-driven enterprise use cases.
Cisco is the worldwide technology leader that securely connects everything to make anything possible.
Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries.
A listing of Cisco's trademarks can be found at www.
The use of the word partner does not imply a partnership relationship between Cisco and any other company.


This Cyber News was published on www.darkreading.com. Publication date: Tue, 06 Feb 2024 23:00:32 +0000


Cyber News related to Cisco Adds New Security and AI Capabilities in Next Step Toward Cisco Networking Cloud Vision

The 10 Best Cloud Security Certifications for IT Pros in 2024 - Many professionals seeking a career in cloud security turn to certifications to advance their learning and prove.... their knowledge to potential employers. The number of cloud security certifications has increased in recent years making it difficult ...
6 months ago Techtarget.com
Multi-Cloud vs. Hybrid Cloud: The Main Difference - The proliferation of cloud technologies is particularly confusing to businesses new to cloud adoption, and they're sometimes baffled by the distinction between multi-cloud and hybrid cloud. Although the public cloud infrastructure and public cloud ...
6 months ago Techtarget.com
6 Best Cloud Security Companies & Vendors in 2024 - Cloud security companies specialize in protecting cloud-based assets, data, and applications against cyberattacks. To help you choose, we've analyzed a range of cybersecurity companies offering cloud security products and threat protection services. ...
4 months ago Esecurityplanet.com
2023 Cloud Security Report - Security concerns remain a critical barrier to cloud adoption, showing little signs of improvement in the perception of cloud security professionals. Cloud adoption is further inhibited by a number of related challenges that prevent the faster and ...
6 months ago Cybersecurity-insiders.com
Cisco Adds New Security and AI Capabilities in Next Step Toward Cisco Networking Cloud Vision - PRESS RELEASE. AMSTERDAM, Feb. 6, 2024 /PRNewswire/ - CISCO LIVE EMEA - Cisco, the leader in networking and security, today introduced new capabilities and technologies across its networking portfolio that are designed to drive a more unified and ...
4 months ago Darkreading.com
What Is Cloud Security Management? Types & Strategies - Cloud security management is the process of safeguarding cloud data and operations from attacks and vulnerabilities through a set of cloud strategies, tools, and practices. The cloud security manager and the IT team are generally responsible for ...
1 month ago Esecurityplanet.com
What is a Cloud Architect and How Do You Become One? - A cloud architect is an IT professional who is responsible for overseeing a company's cloud computing strategy. This includes cloud adoption plans, cloud application design, and cloud management and monitoring. Cloud architects oversee application ...
4 months ago Techtarget.com
Cloud Security: Stats and Strategies - An interesting aspect in O'Reilly's latest Cloud Adoption report based on a global survey conducted is that 90% of the responders are using the cloud to support their business. One of the key takeaways from the State of the Cloud report from Flexera ...
5 months ago Feeds.dzone.com
9 Best DDoS Protection Service Providers for 2024 - eSecurity Planet content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More. One of the most powerful defenses an organization can employ against distributed ...
6 months ago Esecurityplanet.com
Top Cloud Security Issues: Threats, Risks, Challenges & Solutions - Cloud security issues refer to the threats, risks, and challenges in the cloud environment. To combat these cloud security issues, develop a robust cloud security strategy that addresses all three to provide comprehensive protection. Cloud security ...
1 month ago Esecurityplanet.com
Defining the Future of Multicloud Networking and Security: Cisco Announces Intent to Acquire Isovalent - When you think about software networking, at its core, it has two basic functions: send traffic from A to B as quickly and efficiently as possible, and move traffic from A to B but NOT to X, Y, or Z. Software-Defined Networking separates these two ...
6 months ago Feedpress.me
CrowdStrike Enhances Cloud Asset Visualization to Accelerate Risk Prioritization - The massive increase in cloud adoption has driven adversaries to focus their efforts on cloud environments - a shift that led to cloud intrusions increasing by 75% in 2023, emphasizing the need for stronger cloud security. As organizations increase ...
1 month ago Crowdstrike.com
Falcon Cloud Security Supports Google Cloud Run to Strengthen Serverless Application Security - We're thrilled to share that the CrowdStrike Falcon® sensor now fully supports Google Cloud Run, bringing advanced security capabilities to your serverless applications. While we announced this at Google Cloud Next in April 2024, this blog goes ...
6 days ago Crowdstrike.com
4 types of cloud security tools organizations need in 2024 - By now, organizations know which on-premises security tools they need, but when it comes to securing the cloud, they don't always understand which cloud security tools to implement. While many traditional on-premises tools and controls work in the ...
2 months ago Techtarget.com
Managing the Requirements of a MultiCloud System - The use of digital technology has advanced to include cloud computing in the delivery of services, cost reduction, increased agility, and improved security. The emergence of various cloud solutions has led organizations to move their assets from ...
1 year ago Blog.isc2.org
Cloud Security: Ensuring Data Protection in the Cloud - Data Encryption: Protecting sensitive data is a top priority in cloud security. Cloud security is of utmost importance when it comes to protecting and ensuring the confidentiality of data stored and transmitted in the cloud. Data protection in the ...
4 months ago Securityzap.com
CISA adds Check Point Quantum Security Gateways and Linux Kernel flaws to its Known Exploited Vulnerabilities catalog - CISA adds Apache Flink flaw to its Known Exploited Vulnerabilities catalog. CISA adds D-Link DIR router flaws to its Known Exploited Vulnerabilities catalog. CISA adds Google Chrome zero-days to its Known Exploited Vulnerabilities catalog. CISA adds ...
1 month ago Securityaffairs.com
What Is Cloud Workload Security? Ultimate Guide - Cloud workload security, or cloud workload protection, refers to the tools and policies used to protect apps, services, and resources that run on cloud infrastructure. Your organization can manage cloud workload security through coordination across ...
6 days ago Esecurityplanet.com
Benefits and challenges of managed cloud security services - Too many organizations lack the in-house cloud security expertise and resources needed to protect cloud assets effectively. One option to address these challenges is managed cloud security. Outsourcing cloud security to a third party not only helps ...
4 months ago Techtarget.com
REVIEW: ISC2 CERTIFIED CLOUD SECURITY PROFESSIONAL CERTIFICATION - The Certified Cloud Security Professional is a highly respected cybersecurity certification that addresses the needs of professionals and employers for robust and adaptable cloud security expertise. As cyber threats continue to escalate, the demand ...
5 months ago Cybersecurity-insiders.com
Comprehensive Cloud Monitoring Platforms: Ensuring - Platforms for comprehensive cloud monitoring come into play in this situation. In this article, we will explore the significance of comprehensive cloud monitoring platforms and delve into some leading solutions available in the market today. ...
6 months ago Feeds.dzone.com
How to create a cloud security policy, step by step - What's needed is a set of rules for how cloud security is managed, and the key to that is a cloud security policy. A cloud security policy contains detailed guidelines to help an organization ensure that it operates safely in the cloud. Because cloud ...
1 month ago Techtarget.com
Cloud Security Best Practices for Businesses - In today's digital landscape, ensuring robust cloud security is a crucial priority for businesses. The increasing reliance on cloud services to store and process sensitive data necessitates organizations to adopt best practices to safeguard their ...
5 months ago Securityzap.com
3 benefits of going cloud native - Since the start of Microsoft Intune in 2010, we have been working on and iterating toward simplified Windows management, in part by moving infrastructure from on-premises to the cloud. As the capabilities of our customers and Intune grew, a pure ...
6 months ago Microsoft.com
Bringing Simplicity to Security: The Journey of the Cisco Security Cloud - In June of 2022 at the RSA Conference, we announced our vision for the Cisco Security Cloud Platform. Since the announcement, we've been working hard to deliver, and the core of what we've accomplished has been rooted in how we can bring simplicity ...
6 months ago Feedpress.me

Latest Cyber News


Cyber Trends (last 7 days)


Trending Cyber News (last 7 days)