cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
140
Views
1
Helpful
0
Comments
zsoulios
Cisco Employee
Cisco Employee

This program includes content that facilitates an adoption plan, which can be utilized based on each company's needs and the stage of implementation you are in.

It consists of on-demand content for review, accompanied by a short demonstration of the functionality shown in the video.

Additionally, you can find the benefits for security operations and the business, as well as additional links to important information.

Click on each link to access its description and view the available on-demand content.

Join the conversation in the comments below and share your thoughts or questions!

 

Title

Duration

Description

Device Control

8min

This video showcases the key benefits of enabling Device Control in Cisco Secure Endpoint. This feature is essential for strengthening your network security by managing device usage and providing visibility into device connection and disconnection events, as well as access violations. Demo

Orbital: Advanced search

 

8min

Cisco Orbital is a cloud-based endpoint visibility and query tool that is part of the Cisco Secure Endpoint solution. It allows security teams to perform real-time, on-demand queries of endpoint data to enhance threat detection, investigation, and response capabilities. Demo

Best practices: How to convert connectors to protect mode

 

8m

In this video you can learn how to convert connectors to protect mode. Converting connectors to Protect mode in Cisco Secure Endpoint is a best practice that enhances your network's security posture. Demo

Host Firewall

7min

This video highlights the significant benefits of enabling the Host Firewall in Cisco Secure Endpoint. This feature is essential for enhancing your network security and ensuring compliance with security standards. Demo

 

Device and File Trajectory

9min

In this video you can learn how the Device and File Trajectory features provide significant benefits by offering detailed insights into the behavior and movement of files and devices within your network. Device Trajectory and File Trajectory are powerful analysis tools used in investigations to enhance IT security and business operations.

 

 

Explore more on:

  • Endpoint Protection Guided Resources

Cisco Endpoint Protection Guided Resources

  • Secure Endpoint Resources:

Cisco Secure Endpoint Resources - Cisco

  • Technology and Support Events and Webinars

Technology and Support Events and Webinars - Cisco Community

#Cisco #Cybersecurity 

Thank you!

Getting Started

Find answers to your questions by entering keywords or phrases in the Search bar above. New here? Use these resources to familiarize yourself with the community: