Quantcast
Channel: Reg Whitepapers
Browsing all 2501 articles
Browse latest View live

Solving the Unpredictability of AI with SLA-driven Storage-as-a-Service

Nearly every organization recognizes the transformative power of AI to solve real world problems and deliver competitive advantages for their organization. But the exponential growth of AI applications...

View Article


IoT Anywhere: Achieving Fast Time to Market

The number of connected IoT devices is set to grow at over 15% per annum for the rest of this decade. Inevitably, this means the rate of new product introductions is speeding up. As such, time to...

View Article


MISD Empowering the Citizens of the Future Using Cisco XDR

The Cisco XDR Customer Highlight featuring Mansfield Independent School District (MISD) demonstrates how the organization enhanced its cybersecurity strategy by implementing Cisco XDR. This case study...

View Article

Cybersecurity Threats Top of Mind for Healthcare

This Cisco Healthcare Cybersecurity asset highlights the critical importance of robust cybersecurity measures within the healthcare sector. It discusses the unique challenges faced by healthcare...

View Article

George Sink Legal Firm Upgrades Security to Delivery Reliable Client Support

The Cisco XDR Customer Highlight featuring George Sink showcases how the organization leveraged Cisco's Extended Detection and Response (XDR) to enhance its cybersecurity posture. By integrating XDR...

View Article


An XDR Primer: The Promise of Simplifying Security Operations

When you think of a security operations center (SOC), what comes to mind? A room full of ninjas triaging alerts? More likely, it’s a bunch of analysts with too much to do and no clear place to start....

View Article

5 Ways to Experience XDR eBook

Discover how an XDR approach brings data from multiple security tools, applies analytics to arrive at correlated detections, and enables remediation actions to mitigate threats effectively in any...

View Article

XDR For Dummies 2nd Edition

Extended Detection and Response (XDR) For Dummies, 2nd Cisco Special Edition, is refreshed and ready to provide guidance around approaches to XDR.With so many definitions and acronyms related to threat...

View Article


The Art of Defense with Cisco XDR

Inspired by Sun Tzu's "Art of War," The Art of Defense e-book highlights how defenders can create a holistic defense strategy against cyber adversaries and define roles to adequately protect their most...

View Article


Cisco XDR + Meraki MX Native Network Integration

Cisco XDR excels at connecting and correlating data and telemetry from every tool deployed across diverse security stacks, so defenders detect more, act decisively, and elevate productivity. It’s the...

View Article

Cisco XDR Art of Defense Infographic

This infographic explores the comprehensive approach to extended detection and response (XDR) in cybersecurity. It highlights the integration of advanced threat detection, automated response...

View Article

MISD Empowering the Citizens of the Future Using Cisco XDR

The Cisco XDR Customer Highlight featuring Mansfield Independent School District (MISD) demonstrates how the organization enhanced its cybersecurity strategy by implementing Cisco XDR. This case study...

View Article

Cybersecurity Threats Top of Mind for Healthcare

This Cisco Healthcare Cybersecurity asset highlights the critical importance of robust cybersecurity measures within the healthcare sector. It discusses the unique challenges faced by healthcare...

View Article


George Sink Legal Firm Upgrades Security to Delivery Reliable Client Support

The Cisco XDR Customer Highlight featuring George Sink showcases how the organization leveraged Cisco's Extended Detection and Response (XDR) to enhance its cybersecurity posture. By integrating XDR...

View Article

An XDR Primer: The Promise of Simplifying Security Operations

When you think of a security operations center (SOC), what comes to mind? A room full of ninjas triaging alerts? More likely, it’s a bunch of analysts with too much to do and no clear place to start....

View Article


5 Ways to Experience XDR eBook

Discover how an XDR approach brings data from multiple security tools, applies analytics to arrive at correlated detections, and enables remediation actions to mitigate threats effectively in any...

View Article

AI for All

How can we make AI accessible to all?Artificial intelligence (AI) is transforming industries at an unprecedented pace, but the cost and complexity of essential infrastructure, like GPUs, remain...

View Article


7 Ways to Avoid Kubernetes Ransomware Disasters

How to Attain Resilient Application Deployments on KubernetesRansomware is on the rise. In cloud-native environments, application deployments on Kubernetes are especially vulnerable. Protecting this...

View Article

Dispelling Kubernetes Data Protection Myths

In today’s tech landscape, Kubernetes has become key for running applications. However, data protection is still an afterthought for many organizations. Traditional backup methods aren't equipped for...

View Article

Why Kubernetes Applications Need Application Centric Data Protection

As organizations embrace cloud-native architectures for their enterprise and business-critical applications, Kubernetes is evolving beyond its conventional role as a container orchestration platform....

View Article
Browsing all 2501 articles
Browse latest View live


Latest Images