To participate in this event, please use the button to ask your questions
This topic is a chance to clarify your questions about Cisco Threat Response, from its components and new features to the resources to get started. During the session, the Threat Response team will answer questions about how Cisco Threat Response can simplify complex threat investigations in order to improve incident response in these ways:
Coordination of activities among Firepower, Umbrella, AMP, Email Security, Threat Grid, and Talos in order to improve threat hunting efficiency
Reduced adversary dwell times through rapid responses from AMP and Umbrella from a unified response console, in as little as two clicks
Simplified access and module configuration
Ask questions from Tuesday 18th to Friday 21st of February, 2020
Ben Greenbaum is a Technical Marketing Engineer with over twenty years of experience in the Cyber Threat Intelligence field, primarily in the realm of product design and development. His security software career has included roles that span development, architecture, product design, and management of research and development teams. At Cisco, his role is largely to be a liaison between customers and engineering, and to help users get the most from the Cisco Security architecture.
Ben might not be able to answer each question due to the volume expected during this event. Remember that you can continue the conversation on the Security category.
Hi Experts,I am looking for some details about the life cycle and EoL for version 2.7.Since, this is another concern raised by our client.I was able to find it for version 2.3 and 2.4, but unable to find any details as such for version 2.7.
Hi All , I try to block and filter source ip for VPN tunnel (SSL/IPSEC) . I see some document recommend command "control-plan' in access-group command . But I try to use this command but not working . My LAB Topology for Test. Client ...
I have a website hosted on a server on which I have installed self signed certificate. If I install the same self signed certificate on the client device that is on the internet and access the public domain, will that be trusted? if not why? Please h...
We recently upgraded our Cisco ESA and I notice there is a new check box option in SSL Configuration called "TLS Renegotiation". It seems to be checked by default - but doesn't seem to be mentioned in documentation. I'm wondering if we should turn it...