This program includes content that facilitates an adoption plan, which can be utilized based on each company's needs and the stage of implementation you are in.
It consists of on-demand content for review, accompanied by a short demonstration of the functionality shown in the video.
Additionally, you can find the benefits for security operations and the business, as well as additional links to important information.
Click on each link to access its description and view the available on-demand content.
Join the conversation in the comments below and share your thoughts or questions!
Title
|
Duration
|
Description
|
Device Control
|
8min
|
This video showcases the key benefits of enabling Device Control in Cisco Secure Endpoint. This feature is essential for strengthening your network security by managing device usage and providing visibility into device connection and disconnection events, as well as access violations. Demo
|
Orbital: Advanced search
|
8min
|
Cisco Orbital is a cloud-based endpoint visibility and query tool that is part of the Cisco Secure Endpoint solution. It allows security teams to perform real-time, on-demand queries of endpoint data to enhance threat detection, investigation, and response capabilities. Demo
|
Best practices: How to convert connectors to protect mode
|
8m
|
In this video you can learn how to convert connectors to protect mode. Converting connectors to Protect mode in Cisco Secure Endpoint is a best practice that enhances your network's security posture. Demo
|
Host Firewall
|
7min
|
This video highlights the significant benefits of enabling the Host Firewall in Cisco Secure Endpoint. This feature is essential for enhancing your network security and ensuring compliance with security standards. Demo
|
Device and File Trajectory
|
9min
|
In this video you can learn how the Device and File Trajectory features provide significant benefits by offering detailed insights into the behavior and movement of files and devices within your network. Device Trajectory and File Trajectory are powerful analysis tools used in investigations to enhance IT security and business operations.
|
Explore more on:
- Endpoint Protection Guided Resources
Cisco Endpoint Protection Guided Resources
- Secure Endpoint Resources:
Cisco Secure Endpoint Resources - Cisco
- Technology and Support Events and Webinars
Technology and Support Events and Webinars - Cisco Community
#Cisco #Cybersecurity
Thank you!