Threat Intelligence

  • Cisco Umbrella Investigate Overview2:22

    Cisco Umbrella Investigate Overview

    Watch this video for an introduction to Cisco Umbrella Investigate. Investigate provides threat intelligence about domains and IPs across the Internet. Start a 14 Day Free Trial of Cisco Umbrella: ht

    Watch Video
  • Cisco Threat Grid and Investigate Demo9:09

    Cisco Threat Grid and Investigate Demo

    Walk through a demo and see how Cisco Threat Grid and Investigate can provide users the most complete view of an attack.

    Watch Video
  • Investigate from Cisco Umbrella

    Investigate from Cisco Umbrella

    The most complete view of the relationships and evolution of Internet domains, IP addresses, and autonomous systems to pinpoint attackers’ infrastructures and...

    Read PDF
  • Cisco Umbrella Platform

    Cisco Umbrella Platform

    Cloud-delivered network security and threat intelligence that protects any device, anywhere.

    Read PDF
  • Investigate Use Case: Research files hashes during incident response.

    Investigate Use Case: Research files hashes during incident response.

    Read PDF
  • Investigate Use Case: Stay Ahead of Attacks

    Investigate Use Case: Stay Ahead of Attacks

    Investigate provides global intelligence to help security teams hunt & identify threat fingerprints before the kill chain begins.

    Read PDF
  • Investigate Use Case: Speed Up Incident Response

    Investigate Use Case: Speed Up Incident Response

    Investigate provides global context to assess the maliciousness of a domain or IP during incident investigations.

    Read PDF
  • The role of predictive intelligence in the fight against cyberattacks

    The role of predictive intelligence in the fight against cyberattacks

    Use a predictive IT strategy to prevent attacks before they’re launched.

    Read PDF
  • The modern way of hunting  - how three CTOs tackle incident response52:39

    The modern way of hunting - how three CTOs tackle incident response

    Your corporate network is open terrain. And it's hunting season. Malware, ransomware, and phishing scams are lurking. It's time to identify these threats to the enterprise earlier in the kill-chain

    Watch Video
  • The holy grail of incident response26:29

    The holy grail of incident response

    A Single, Correlated Source of Intelligence About Domains, IPs, and Malware Files Time is of the essence when you’re investigating security incidents. While it’s critical to find out as much as you

    Watch Video
  • Uncovering attacks before they launch29:38

    Uncovering attacks before they launch

    Attackers try to be crafty when planning attacks. They carefully research their intended targets, register domain names that seem legitimate, buy malware payloads, and create the perfect spear phish

    Watch Video
  • Covering Your DNS Blind Spot

    Covering Your DNS Blind Spot

    Enhance your security visibility and improve incident response and policy compliance.

    Read PDF
  • Custom Integrations

    Custom Integrations

    For the first time, you can prevent threats both on & off the corporate network using APIs.

    Read PDF
  • Cisco AMP Threat Grid Integration

    Cisco AMP Threat Grid Integration

    Our turn-key integration lets you automate action on newly discovered malicious domains.

    Read PDF
  • FireEye Integration

    FireEye Integration

    Global protection against advanced malware.

    Read PDF
  • ThreatQuotient Integration

    ThreatQuotient Integration

    Programmatically take immediate action on threat intelligence.

    Read PDF
  • Before the kill chain: what attackers are doing and how you can spot them53:42

    Before the kill chain: what attackers are doing and how you can spot them

    Attackers can't hide on the Internet—in fact, they leave behind fingerprints in areas you may not realize. Prior to launching an attack, the bad guys need to set up servers, obtain IP addresses, and r

    Watch Video
  • Internet of things in the enterprise: the data behind the risks46:04

    Internet of things in the enterprise: the data behind the risks

    Many have hypothesized about the security impact of the "Internet of Things" (IoT) for enterprises, but for the first time, we have actual data on the potential security risks introduced by these d

    Watch Video
  • From event gatherer to threat hunter: orchestrating proactive incident response45:10

    From event gatherer to threat hunter: orchestrating proactive incident response

    The prevent-detect-respond cycle is a cornerstone of IT security. Historically, it’s been handled as a reactive cycle. We often wait until prevention fails and we’ve gathered enough security events, b

    Watch Video
  • loading
    Loading More...