cisco

Results 201 - 225 of 1391Sort Results By: Published Date | Title | Company Name
Published By: Cisco     Published Date: Jul 30, 2015
Enabling the Internet of Everything.
Tags : 
    
Cisco
Published By: Cisco     Published Date: Aug 28, 2015
Viewing this video you will learn: What is impeding many organizations from adopting cloud–based service delivery How to apply automation across all organizational layers using a stepwise, pragmatic approach with Cisco ONE Enterprise Cloud Suite.
Tags : 
cloud, hybrid, iot, public cloud, service, automation
    
Cisco
Published By: Cisco     Published Date: Sep 16, 2015
Forward-thinking IT departments are using the cloud as a transformative engine, helping them transition from tactical systems administrators to strategic service brokers. In doing so, they have an opportunity to redefine their partnership with business groups and become more influential, effective leaders of revenue and growth.
Tags : 
cloud, hybrid, iot, public cloud, service, automation
    
Cisco
Published By: AppDynamics     Published Date: Apr 04, 2018
Application performance monitoring (APM) companies are quickly becoming some of the most important players in the IT landscape as enterprises strive to deliver best-in-class customer experiences. Download Gartner’s 2018 Magic Quadrant for APM to see: • Gartner's updated evaluation criteria • Evaluations of each recognized vendor • An analysis of current trends in the APM market
Tags : 
    
AppDynamics
Published By: Cisco     Published Date: Apr 03, 2014
The 2014 Cisco® Annual Security Report highlights global threat trends based on real-world data, and provides insight and analysis that helps businesses and governments improve their security posturing for the future.
Tags : 
cisco, security, firewall, global threat, trends, applications, cloud
    
Cisco
Published By: Cisco     Published Date: Apr 03, 2014
The 2014 Cisco® Annual Security Report highlights global threat trends based on real-world data, and provides insight and analysis that helps businesses and governments improve their security posturing for the future.
Tags : 
cisco, security, firewall, global threat, trends, applications, cloud
    
Cisco
Published By: Cisco     Published Date: Apr 03, 2014
The 2014 Cisco® Annual Security Report highlights global threat trends based on real-world data, and provides insight and analysis that helps businesses and governments improve their security posturing for the future.
Tags : 
cisco, security, firewall, global threat, trends, applications, cloud
    
Cisco
Published By: Cisco     Published Date: Sep 12, 2014
Adversaries spend 100 percent of their time finding weak links and using them to their advantage. And as the Internet of Things accelerates and our dependence on the connected environment continues to expand, so do opportunities for attackers. Download the Cisco 2014 Midyear Security Report to learn about the different types of vulnerabilities that exist in the systems we rely upon, including the Internet itself, and what can be done to reduce their number and impact.
Tags : 
adversaries, weak, link, internet, dependence, connected, environment, attackers, opportunities, security, system, impact, it management
    
Cisco
Published By: Cisco     Published Date: Feb 17, 2015
The Cisco 2015 Annual Security Report, which presents the research, insights, and perspectives provided by Cisco® Security Research and other security experts within Cisco, explores the ongoing race between attackers and defenders, and how users are becoming everweaker links in the security chain.
Tags : 
cisco, security, report, 2015, threat, intelligence, capabilities, benchmark, trends, cyber security, geopolitical, corporate, vulnerabilities, risk, spam, cybercrime, data, encryption, privacy, compatibility
    
Cisco
Published By: Cisco     Published Date: Oct 08, 2015
The Cisco 2015 Annual Security Report, which presents the research, insights, and perspectives provided by Cisco Security Research and other security experts within Cisco, explores the ongoing race between attackers and defenders, and how users are becoming ever-weaker links in the security chain.
Tags : 
security, cisco, hacking, malware, attackers, security report, enterprise applications
    
Cisco
Published By: Cisco     Published Date: Oct 14, 2015
The report is divided into two main areas: Threat Intelligence, which gives an overview of the latest threat research from Cisco. And, Analysis and Observations, where security industry consolidation and the emerging concept of integrated threat defense is discussed.
Tags : 
cisco, security report, cisco security report 2015, threat intelligence, network defenses, networking, security, it management, wireless, enterprise applications, business technology
    
Cisco
Published By: Cisco     Published Date: Aug 24, 2015
The Cisco 2015 Midyear Security Report examines these intersecting challenges while also providing updates on some of the most compelling threats. Using research by our experts, it provides an overview of the major threats observed in the first half of 2015. This report also explores likely future trends and offers advice for small, midsize, and enterprise organizations that seek security solutions and services.
Tags : 
malware, network defenses, detection, security gaps, threat defenses, trends, networking, security, it management
    
Cisco
Published By: Cisco     Published Date: Jun 16, 2016
Adversaries and defenders are both developing technologies and tactics that are growing in sophistication. For their part, bad actors are building strong back-end infrastructures with which to launch and support their campaigns. Online criminals are refining their techniques for extracting money from victims and for evading detection even as they continue to steal data and intellectual property.
Tags : 
security, technology, security tactics, data
    
Cisco
Published By: Cisco     Published Date: Dec 21, 2016
The Cisco 2016 Annual Security Report—which presents research, insights, and perspectives from Cisco Security Research—highlights the challenges that defenders face in detecting and blocking attackers who employ a rich and ever-changing arsenal of tools. The report also includes research from external experts, such as Level 3 Threat Research Labs, to help shed more light on current threat trends. We take a close look at data compiled by Cisco researchers to show changes over time, provide insights on what this data means, and explain how security professionals should respond to threats.
Tags : 
    
Cisco
Published By: Cisco     Published Date: Feb 16, 2016
Adversaries and defenders are both developing technologies and tactics that are growing in sophistication. For their part, bad actors are building strong back-end infrastructures with which to launch and support their campaigns. Online criminals are refining their techniques for extracting money from victims and for evading detection even as they continue to steal data and intellectual property.
Tags : 
technology, infrastructure management, security
    
Cisco
Published By: Cisco     Published Date: Apr 11, 2016
Los atacantes y los responsables de la seguridad están desarrollando tecnologías y tácticas cada vez más sofisticadas. Por su parte, los atacantes están creando infraestructuras back-end sólidas para el lanzamiento y soporte de sus campañas. Los ciberdelincuentes están perfeccionando sus técnicas para obtener dinero de sus víctimas y para evitar ser detectados mientras continúan robando datos y propiedad intelectual.
Tags : 
    
Cisco
Published By: Cisco     Published Date: Oct 11, 2016
The Cisco® 2016 Midyear Cybersecurity Report—which presents research, insights, and perspectives from Cisco Security Research—updates security professionals on the trends covered in our previous security report while also examining developments that may affect the security landscape later this year.
Tags : 
cybersecurity, attackers, http, ransomeware, malware
    
Cisco
Published By: Cisco     Published Date: Sep 14, 2017
For nearly a decade, Cisco has published comprehensive cybersecurity reports that are designed to keep security teams and the businesses they support apprised of cyber threats and vulnerabilities—and informed about steps they can take to improve security and cyber-resiliency
Tags : 
    
Cisco
Published By: Cisco     Published Date: Sep 21, 2017
For nearly a decade, Cisco has published comprehensive cybersecurity reports that are designed to keep security teams and the businesses they support apprised of cyber threats and vulnerabilities—and informed about steps they can take to improve security and cyber-resiliency. In these reports, we strive to alert defenders to the increasing sophistication of threats and the techniques that adversaries use to compromise users, steal information, and create disruption. Download this whitepaper to find out more.
Tags : 
cyber attacks, data protection, it security, security solutions, system protector, web security, analytics
    
Cisco
Published By: Cisco     Published Date: Dec 27, 2017
For nearly a decade, Cisco has published comprehensive cybersecurity reports that are designed to keep security teams and the businesses they support apprised of cyber threats and vulnerabilities—and informed about steps they can take to improve security and cyber-resiliency. In these reports, we strive to alert defenders to the increasing sophistication of threats and the techniques that adversaries use to compromise users, steal information, and create disruption.
Tags : 
    
Cisco
Published By: Cisco EMEA     Published Date: Jun 01, 2018
What if defenders could see the future? If they knew an attack was coming, they could stop it, or at least mitigate its impact and help ensure what they need to protect most is safe. The fact is, defenders can see what’s on the horizon. Many clues are out there—and obvious. The Cisco 2018 Annual Cybersecurity Report presents our latest security industry advances designed to help organizations and users defend against attacks. We also look at the techniques and strategies that adversaries use to break through those defenses and evade detection. The report also highlights major findings from the Cisco 2018 Security Capabilities Benchmark Study, which examines the security posture of enterprises and their perceptions of their preparedness to defend against attacks.
Tags : 
    
Cisco EMEA
Published By: Cisco     Published Date: Sep 27, 2018
Asia Pacific is an exciting region where great strides are being made in digital transformation. It is home to significantly diverse economies and is remarkably leading the charge in developing connected cities of the future—smart cities. Many economies are seeing the benefits of these rapid developments, and as the Internet of Things (IoT) becomes commonplace in organizations and workers continue to work remotely and flexibly, more devices are becoming connected to the Internet.
Tags : 
    
Cisco
Published By: Cisco EMEA     Published Date: Mar 14, 2018
What if defenders could see the future? If they knew an attack was coming, they could stop it, or at least mitigate its impact and help ensure what they need to protect most is safe. The fact is, defenders can see what’s on the horizon. Many clues are out there—and obvious. For years, Cisco has been warning defenders about escalating cybercriminal activity around the globe. In this, our latest annual cybersecurity report, we present data and analysis from Cisco threat researchers and several of our technology partners about attacker behavior observed over the past 12 to 18 months.
Tags : 
    
Cisco EMEA
Published By: Citrix Systems     Published Date: Jul 28, 2015
In this white paper we will discuss: • Why data center limitations are restricting business agility. • How Cisco Application Centric Infrastructure (ACI) supports frequent changes in applications and infrastructure. • How Cisco and Citrix® have integrated NetScaler® with ACI to improve data center agility.
Tags : 
    
Citrix Systems
Published By: Cisco     Published Date: Sep 17, 2015
View this infographic to learn how Cisco's ACI can produce benefits throughout your company, from fully automating IT and standardizing policy to reducing costs across your departments.
Tags : 
datacenter, aci, enterprise, networking, virtualization, cloud computing, infrastructure, design and facilities
    
Cisco
Start   Previous    2 3 4 5 6 7 8 9 10 11 12 13 14 15 16    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.

We use technologies such as cookies to understand how you use our site and to provide a better user experience. This includes personalizing content, using analytics and improving site operations. We may share your information about your use of our site with third parties in accordance with our Privacy Policy. You can change your cookie settings as described here at any time, but parts of our site may not function correctly without them. By continuing to use our site, you agree that we can save cookies on your device, unless you have disabled cookies.
I Accept