Security in 45

著者: Mike Veedock and Andres Sarmiento
  • サマリー

  • A monthly security-focused webinar in a fun podcast format! Each episode features a new security topic, with industry-leading guest speakers on every show. Every episode is followed by a Live Demo of the same topic the following day! Designed to be enjoyed over your lunch or coffee break! And open to ALL, customers, partners, and internal Cisco employees.

    続きを読む 一部表示

あらすじ・解説

A monthly security-focused webinar in a fun podcast format! Each episode features a new security topic, with industry-leading guest speakers on every show. Every episode is followed by a Live Demo of the same topic the following day! Designed to be enjoyed over your lunch or coffee break! And open to ALL, customers, partners, and internal Cisco employees.

エピソード
  • S2 E2 - Simplicity with SSE - Cisco Secure Access Discussion with David Keller and Justin Murphy
    2024/11/01

    The meeting discussed updates and plans for Secure Access and User Suite, including hybrid cloud deployment, VPN enhancements, simplification of connectivity and policy management, and the consolidation of tools into a single dashboard. Secure Access and User Suite were discussed in a recent meeting, including plans for a hybrid cloud deployment. There have been updates to VPN, such as radius support and SMB version two for ZTA. The use of quick and mask for performance improvement is being discussed, but no claims are being made yet. Participants discussed their plans for trick-or-treating and handing out candy on Halloween. They also mentioned decorating their houses with inflatables and lights for the occasion. Secure Access offers flexibility for connecting different devices and users to various resources. The goal is to move towards simplicity, allowing end users to connect without thinking about the process. Security features include zero trust access, user identity verification, posture controls, and various security controls for internet and private access. Secure access is working on all aspects of the dashboard, including policy, internet experience insights, and analyzing reporting and logs. Experience insights integrated with secure access dashboard provides real-time monitoring of user experience, device resources, and network performance. Secure access simplifies connectivity by allowing application definitions to be defined once and providing redundancy through network tunnel groups and resource connectors. The goal is to have a unified policy that can be implemented across all layers and aspects of the network. Secure access aims to simplify remote access VPN for end users and make it easier for administrators. The secure access solution consolidates multiple tools and services into a single dashboard. There is a focus on simplification, enabling engineers to be more strategic and less tactical. SSL decryption in secure access allows for global decryption at the firewall level and selective decryption for web traffic. TLS 1.3 is fully decrypted, providing advanced capabilities to block specific aspects of applications. Secure access offers scalability and handles increased encrypted traffic without impacting user experience or requiring additional hardware.

    続きを読む 一部表示
    52 分
  • XDR Conversation with Briana Farro and Matt Robertson
    2024/10/02

    The meeting discussed the features and benefits of Cisco XDR, including its integration capabilities, threat detection capabilities, and plans for expansion. Season two of the Security 45 show will feature live demos after each conversation. Matt Robertson, a distinguished engineer at Cisco, focuses on threat detection and oversees analytics stacks. XDR has gained higher demand and market traction over the past year, with Cisco XDR acquiring new customers. Cisco XDR defines XDR as a collection of telemetry from multiple sources and the application of analytics for threat detection and response. Cisco XDR is an open ecosystem that integrates with third-party vendors, even direct competitors, to provide comprehensive threat detection capabilities. Meraki integration allows for easy deployment of network detection and response product with direct cloud upload of logs. The XDR integration solves the problem of overlapping IP spaces in branch scenarios, allowing for unique profiling of devices. Matt is the champion of the effort to bring Cisco's solutions together and make them simple and unified. XDR has added many integrations for responsive actions, including extra hop, dark trace, and Microsoft 3605 for email. XDR allows for customization of guided response playbooks and the sharing of workflows on the automate exchange. Cisco XDR simplifies incidents by consolidating related information into a single incident. Advanced analytics and correlation across multiple sources help determine incident severity and prioritize actions. XDR's ability to correlate data from suspicious emails to network logons enables the identification of compromised accounts. Cisco plans to expand XDR capabilities to include enterprise networking spaces like Meraki and Cat 9000. Vendors are transitioning from EDR or SIM to XDR, with Cisco, Microsoft, and Palo Alto making acquisitions. Cisco aims to bring together threat detection, incident response, and intelligent response management for customers. Integration and collaboration between different solutions, such as Splunk Enterprise and XDR, are being prioritized.

    続きを読む 一部表示
    1 時間 1 分
  • Security & Artificial Intelligence with with Joel Sprague and Sudhir Desai
    2024/10/02

    Summary (AI-Generated) what AI is and how it works; why we are seeing so much emphasis on AI these days; the dangers of AI, such as data exposure and wrong information; what Cisco is doing to secure AI; recommendations for customers who are using AI. Some key points from the video: AI is a fancy expensive autocomplete. We are seeing so much emphasis on AI these days because we have more resources to really see it explode and to see the benefits of it. The dangers of AI include data exposure, wrong information, and hacks. Cisco is working on securing AI by monitoring it, testing it out all the time, and keeping it secure. Recommendations for customers who are using AI include monitoring it, testing it out all the time, and keeping it secure.

    続きを読む 一部表示
    56 分

Security in 45に寄せられたリスナーの声

カスタマーレビュー:以下のタブを選択することで、他のサイトのレビューをご覧になれます。