Webcast Library

  • Reduce Phishing Risk in Minutes with Umbrella and Duo36:38

    Reduce Phishing Risk in Minutes with Umbrella and Duo

    Cloud applications provide scale and cost benefits over legacy on-premises solutions. With more users going direct-to-internet from any device, the risk increases when users bypass security controls.

    Watch Video
  • Cloud Delivered Security for K 1240:46

    Cloud Delivered Security for K 12

    Discover why school boards across Canada choose Cisco Cloud Security to secure the modern classroom, reduce overhead and lower total cost of ownership.

    Watch Video
  • Cisco Umbrella: First Line of Defense Against Threats40:47

    Cisco Umbrella: First Line of Defense Against Threats

    Cisco Umbrella is a cloud security platform that leverages DNS to provide the first line of defense against threats on the internet wherever users go.

    Watch Video
  • Secure your journey through the cloud30:43

    Secure your journey through the cloud

    How do you deploy effective security for a multi-cloud world? How do you secure both access to the cloud and usage of it? How do you get greater visibility into those environments and reduce the risk

    Watch Video
  • Cybersecurity Tips for Device & Data Protection: Summertime Edition1:02:31

    Cybersecurity Tips for Device & Data Protection: Summertime Edition

    Media Webcast: Don't get burned this summer by crafty phishing attempts, rogue WiFi hotspots, lost or stolen devices, and varying encryption laws. Watch now.

    Watch Video
  • See and Protect Users and Endpoints Everywhere35:23

    See and Protect Users and Endpoints Everywhere

    Find out how you can strengthen your security posture and protect your users and devices, everywhere they access the internet.

    Watch Video
  • 3 Easy Ways to Secure Your K-12 School District24:10

    3 Easy Ways to Secure Your K-12 School District

    Learn three simple ways to secure your school district, and save time and money!

    Watch Video
  • Turn Shadow IT Risks into Insights42:12

    Turn Shadow IT Risks into Insights

    Watch Video
  • Cisco Umbrella: First Line of Defense Against Threats35:40

    Cisco Umbrella: First Line of Defense Against Threats

    Cisco Umbrella is a cloud security platform that leverages DNS to provide the first line of defense against threats on the internet wherever users go.

    Watch Video
  • From Chaos to Clarity: New Trends on Securing Roaming Users & Branch Offices49:23

    From Chaos to Clarity: New Trends on Securing Roaming Users & Branch Offices

    With highly distributed environments becoming the norm, SaaS usage on the rise and roaming users an attractive target for threats, find out how to shift your security, gain control and protect users m

    Watch Video
  • Meraki & Umbrella: A match made in the cloud26:44

    Meraki & Umbrella: A match made in the cloud

    What if you could protect every user on your Meraki network in minutes without deploying an additional appliance? That’s the magic of combining the Meraki MR wireless access points and Cisco Umbrella.

    Watch Video
  • Networking and Security - Bury the Hatchet in the Cloud37:02

    Networking and Security - Bury the Hatchet in the Cloud

    Learn why joining forces with your networking manager may be the best thing for your security team right now.

    Watch Video
  • Bust Threats or Risk Getting Busted30:46

    Bust Threats or Risk Getting Busted

    Learn the latest trends on top threats and best practices you can use to protect against threats in your organization. Find out what techniques, tricks and tips Cisco researchers use to uncover and i

    Watch Video
  • You have been breached, now what?48:55

    You have been breached, now what?

    You are doing everything you can to avoid breaches. But what happens when a hacker manages to bypass your security? In this webinar we will show you how to build a strong security posture and a laye

    Watch Video
  • Cracking down on cryptocurrency24:27

    Cracking down on cryptocurrency

    The birth of cryptocurrency has changed the threat landscape making it easier for malicious actors to get paid and remain anonymous. While the days of ransomware being paid in cryptocurrency is far fr

    Watch Video
  • 2018’s Top Threat Malicious Cryptomining — Now What?23:03

    2018’s Top Threat Malicious Cryptomining — Now What?

    With a 19x increase in crypto-related traffic in the last nine months, there’s never been a better time to find out if computing resources in your organization are being used without your knowledge.

    Watch Video
  • Aplicativos desconectados com riscos descobertos (Risky Connected Apps Uncovered - Portuguese)3:31

    Aplicativos desconectados com riscos descobertos (Risky Connected Apps Uncovered - Portuguese)

    Assista ao nosso vídeo destacando o Shadow IT que importa mais do que outros: aplicativos conectados OAuth

    Watch Video
  • Aplicaciones Riesgo Conectadas Descubiertas (Risky Connected Apps Uncovered - Spanish)3:48

    Aplicaciones Riesgo Conectadas Descubiertas (Risky Connected Apps Uncovered - Spanish)

    Vea nuestro video destacando el Shadow IT que importa más que otros: OAuth apps conectadas

    Watch Video
  • Es Martes, Carl (It's Tuesday, Carl - Spanish)3:03

    Es Martes, Carl (It's Tuesday, Carl - Spanish)

    Vea nuestro video destacando los desafíos que enfrentan las organizaciones cuando se trata de la seguridad en la nube. Watch our video highlighting the challenges that organizations face when it come

    Watch Video
  • É terça-feira, Carl (It's Tuesday, Carl - Portuguese)3:03

    É terça-feira, Carl (It's Tuesday, Carl - Portuguese)

    Assista ao nosso vídeo destacando os desafios que as organizações enfrentam quando se trata de segurança na nuvem. Watch our video highlighting the challenges that organizations face when it comes to

    Watch Video
  • loading
    Loading More...