From Threat Response you can block a file hash (powered by AMP), block a domain (powered by Umbrella), and even isolate an affected host (powered by AMP). Some of these capabilities are also available through the Chrome and Firefox browser plugins and op...
You can check out our video on the relations graph, or learn more by reviewing the in product detailed model Cisco Threat Intelligence Model.
Learn more about Threat Response here, or check out other FAQs here.
Threat Response can handle a vast list of observables. For instance, you can search for IP addresses, domains, URLs, file hashes, MAC addresses, or even a specific device or specific user. You can get a full list of observables you can search for within ...
Threat Response Basics
What is Threat Response and how can it help my organization?
What is the cost of Threat Response?
What are the deployment options for Threat Response?
Is Threat Response available outside of the United States?
Gartner has once again named Cisco a Leader in the Magic Quadrant for Network Firewalls. This distinction recognizes Cisco's ingenuity in redefining the firewall as the basis for an integrated security platform.
Find out how Cisco stands out from the comp...