fbpx

In the event you missed it: have a look at what’s new with SecureX from Cisco Live!

 

For the very first time ever, Cisco is getting customers and partners from all over the global world with each other for an all-in-1 global event! This week, an experience has been delivered by us unlike any; this comes at a fascinating time for Cisco SecureX . SecureX has already been simplifying security for nearly a whole year now and contains defined just what a true security platform method means giving security also it decision makers a far more effective solution to protect and connect to their growing networks.

However… at Cisco, we feel just like SecureX gets started just. It continues to provide new methods to automate tasks to decrease the amount of human hours focused on SecOps and NetOps responses. Its rich integrations continue steadily to grow, enabling businesses of all sizes and shapes to increase their current investments having an built-in and robust security system. And it proceeds to multiply the worthiness of one’s Cisco Secure solutions that, although powerful by themselves, are able to supply richer context, greater visibility, and stronger outcomes when included through backend connections that provide users the easy security experience they are looking for.

year at Cisco Live This, we are switching it up for Cisco SecureX customers. You will find numerous sessions that can arm customers with the most recent SecureX enhancements, investigate hot topics in the security industry, and ensure you get more from your security investments. This is a closer look at a few of the exciting items that are arriving at SecureX and where one can go to find out more.

Obtain time back and concentrate on what counts with SecureX Orchestration

SecureX Orchestration is really a feature of SecureX which allows users to execute responses with machine-like speed making use of response workflows, established sequences of actions that leverage capabilities across multiple incorporated technologies, to lessen the true amount of human hours allocated to investigation, response, threat hunting plus much more. Cisco offers many pre-built workflows, processes which are ready for you yourself to begin using, but additionally provides SecureX customers the opportunity to create their own by way of a low/no code interface. Similar to SecureX threat response, Orchestration is really a feature that’s available to any active SecureX user. And when you are making use of SecureX threat response but haven’t yet tried orchestration, make sure to have a look at this 2-minute video to understand how to begin today.

SecureX Orchestration addresses the SolarWinds attack at once. At Cisco Live, you’ll reach see this workflow doing his thing and will understand precisely how simple it is to comprehend if your network had been impacted, when this occurred, and how this occurred. Since Orchestration really does the ongoing do the job, you can basically receive document or results findings in your SecureX threat response casebook, Webex Teams, Slack, or via email. Among our other pre-built workflows certainly are a phishing investigation , a workflow made to simplify threat hunting , and more.

“We’ve observed a dramatic decrease in our ‘time to resolution ’ in scenarios where we’ve leveraged SecureX automation and orchestration… Where possible, we’ve automatic repetitive tasks out of our playbooks altogether in order that our analysts’ time is targeted on giving an answer to the incident. Doing this has decreased our SOC incident closure time by about 40%.
Ian McGowan, Handling Director at Barrier Networks

 

To learn more regarding SecureX Orchestration make sure to browse the following sessions from Cisco Live that are offered now:

    • PSOSEC-2004 Achieve Simplicity, Visibility, and Efficiency having an Integrated Security System

 

    • BRKSEC-2053 SecureX Orchestration: Two Methods for getting Value on Day One

 

 

 

True turnkey 3 rd celebration configuration

 

You’re known by us use other vendors besides Cisco. So, you want to create integrating and configuring 3 rd celebration solutions basic. SecureX was created right from the start to be built-in and open to use every tool – regardless of the vendor. It really is created to unify visibility across all your security control points and the rich Cisco and 3 rd celebration integrations are what create SecureX truly unique because they enable users to conduct investigations, share intelligence and increase every cybersecurity investment. At Cisco Live, we’ve showcased how exactly we are simplifying an individual experience for 3 rd celebration configurations. Up until nowadays, only your Cisco security integrations had been turnkey truly. Users could simply stage their APIs in to the SecureX dashboard for connecting a preexisting security tool to the SecureX system. We are enhancing our 3 rd celebration integrations in the spirit of visibility, efficiency and simplicity giving you that same experience, no matter owner. During the past, 3 rd celebration integrations were permitted by deploying new code in customer environments or by relay modules in backed 3 rd celebration infrastructure. We have been moving that technology internal to consider the weight off your shoulders.

This change enables true turnkey configuration for added 3 rd party tools and intelligence sources, rendering it easier than previously for connecting additional solutions for quick value and added SecOps, ITOps and netops outcomes. For more information about our security system and 3 rd celebration enhancements make sure to check out the subsequent Cisco Live sessions:

    • PSOSEC-1001 The Industry’s Broadest XDR with an integral Experience, Not just a Bolted-On Tool

 

    • BRKSEC-2005 SecureX Everything (With Hosted and Remote control Relays)

 

 

 

A Cisco Security customer already? You possess SecureX. SecureX is really a built-in experience for several Cisco Secure customers and all you must do will be activate . Cisco Live now could be happening! So make sure to tune in for the most recent from SecureX to attain your preferred security outcomes.

        <br>

 

%d bloggers like this: