Enviar búsqueda
Cargar
Laser Pioneer Secures Network End-to-End to Protect Assets
•
0 recomendaciones
•
1,122 vistas
Cisco Security
Seguir
Coherent mitigates against global cyber threats with Cisco Cloud Web Security.
Leer menos
Leer más
Tecnología
Denunciar
Compartir
Denunciar
Compartir
1 de 4
Descargar ahora
Descargar para leer sin conexión
Recomendados
Cisco Connect 2018 Indonesia - Cybersecurity Strategy
Cisco Connect 2018 Indonesia - Cybersecurity Strategy
NetworkCollaborators
Cisco Connect 2018 Indonesia - software-defined access-a transformational ap...
Cisco Connect 2018 Indonesia - software-defined access-a transformational ap...
NetworkCollaborators
Cisco Connect 2018 Malaysia - SDNNFV telco data center transformation
Cisco Connect 2018 Malaysia - SDNNFV telco data center transformation
NetworkCollaborators
Cisco Connect 2018 Vietnam - data center transformation - vn
Cisco Connect 2018 Vietnam - data center transformation - vn
NetworkCollaborators
Cisco VMDC Cloud Security 1.0 Design Guide
Cisco VMDC Cloud Security 1.0 Design Guide
Cisco Service Provider
Cisco Connect 2018 Malaysia - Cisco services-guiding your digital transformation
Cisco Connect 2018 Malaysia - Cisco services-guiding your digital transformation
NetworkCollaborators
[Cisco Connect 2018 - Vietnam] Brian cotaz cyber security strategy
[Cisco Connect 2018 - Vietnam] Brian cotaz cyber security strategy
Nur Shiqim Chok
Enterprise-Grade Trust: Collaboration Without Compromise
Enterprise-Grade Trust: Collaboration Without Compromise
Robb Boyd
Recomendados
Cisco Connect 2018 Indonesia - Cybersecurity Strategy
Cisco Connect 2018 Indonesia - Cybersecurity Strategy
NetworkCollaborators
Cisco Connect 2018 Indonesia - software-defined access-a transformational ap...
Cisco Connect 2018 Indonesia - software-defined access-a transformational ap...
NetworkCollaborators
Cisco Connect 2018 Malaysia - SDNNFV telco data center transformation
Cisco Connect 2018 Malaysia - SDNNFV telco data center transformation
NetworkCollaborators
Cisco Connect 2018 Vietnam - data center transformation - vn
Cisco Connect 2018 Vietnam - data center transformation - vn
NetworkCollaborators
Cisco VMDC Cloud Security 1.0 Design Guide
Cisco VMDC Cloud Security 1.0 Design Guide
Cisco Service Provider
Cisco Connect 2018 Malaysia - Cisco services-guiding your digital transformation
Cisco Connect 2018 Malaysia - Cisco services-guiding your digital transformation
NetworkCollaborators
[Cisco Connect 2018 - Vietnam] Brian cotaz cyber security strategy
[Cisco Connect 2018 - Vietnam] Brian cotaz cyber security strategy
Nur Shiqim Chok
Enterprise-Grade Trust: Collaboration Without Compromise
Enterprise-Grade Trust: Collaboration Without Compromise
Robb Boyd
Introduction to Cloud Security
Introduction to Cloud Security
Susanne Tedrick
Cisco Connect 2018 Singapore - Easing the Transition
Cisco Connect 2018 Singapore - Easing the Transition
NetworkCollaborators
Tomorrow Starts Here - Security Everywhere
Tomorrow Starts Here - Security Everywhere
Cisco Canada
Cisco Connect 2018 Singapore - Changing the Security Equation
Cisco Connect 2018 Singapore - Changing the Security Equation
NetworkCollaborators
Cisco Connect 2018 Thailand - Cisco Meraki an innovation journey to a smarter...
Cisco Connect 2018 Thailand - Cisco Meraki an innovation journey to a smarter...
NetworkCollaborators
Securing_your_Internet_of_Things_from_the_ground_up_white_paper_EN_US
Securing_your_Internet_of_Things_from_the_ground_up_white_paper_EN_US
Ingrid Fernandez, PhD
CCSK, cloud security framework, Indonesia
CCSK, cloud security framework, Indonesia
Wise Pacific Venture
Cisco Connect 2018 Singapore - Transforming Enterprises in a Multi-Cloud World
Cisco Connect 2018 Singapore - Transforming Enterprises in a Multi-Cloud World
NetworkCollaborators
Cisco Connect 2018 Singapore - Cisco CMX
Cisco Connect 2018 Singapore - Cisco CMX
NetworkCollaborators
Cisco 2015 Midyear Security Report Slide Deck
Cisco 2015 Midyear Security Report Slide Deck
Cisco Security
Presentation cisco cloud security
Presentation cisco cloud security
xKinAnx
How Zero Trust Makes the Mission Simple & Secure
How Zero Trust Makes the Mission Simple & Secure
scoopnewsgroup
Secure Data Center for Enterprise— Threat Management with NextGen IPS
Secure Data Center for Enterprise— Threat Management with NextGen IPS
Cisco Russia
Advance security in cloud computing for military weapons
Advance security in cloud computing for military weapons
IRJET Journal
The Polytechnic of Namibia
The Polytechnic of Namibia
Cisco Case Studies
Automatizovaná bezpečnost – nadstandard nebo nutnost?
Automatizovaná bezpečnost – nadstandard nebo nutnost?
MarketingArrowECS_CZ
Cloud Security
Cloud Security
The TNS Group
Business Continuity and app Security
Business Continuity and app Security
Cristian Garcia G.
Top 5 reasons to purchase cisco asa 5500 series
Top 5 reasons to purchase cisco asa 5500 series
IT Tech
Cy Cops Company Presentation
Cy Cops Company Presentation
ChaitanyaS
The Evolution of and Need for Secure Network Access
The Evolution of and Need for Secure Network Access
Cisco Security
Mar Camacho, Universitat Rovira i Virgili Faculty (Spain), Visiting scholar a...
Mar Camacho, Universitat Rovira i Virgili Faculty (Spain), Visiting scholar a...
MobileCreation
Más contenido relacionado
La actualidad más candente
Introduction to Cloud Security
Introduction to Cloud Security
Susanne Tedrick
Cisco Connect 2018 Singapore - Easing the Transition
Cisco Connect 2018 Singapore - Easing the Transition
NetworkCollaborators
Tomorrow Starts Here - Security Everywhere
Tomorrow Starts Here - Security Everywhere
Cisco Canada
Cisco Connect 2018 Singapore - Changing the Security Equation
Cisco Connect 2018 Singapore - Changing the Security Equation
NetworkCollaborators
Cisco Connect 2018 Thailand - Cisco Meraki an innovation journey to a smarter...
Cisco Connect 2018 Thailand - Cisco Meraki an innovation journey to a smarter...
NetworkCollaborators
Securing_your_Internet_of_Things_from_the_ground_up_white_paper_EN_US
Securing_your_Internet_of_Things_from_the_ground_up_white_paper_EN_US
Ingrid Fernandez, PhD
CCSK, cloud security framework, Indonesia
CCSK, cloud security framework, Indonesia
Wise Pacific Venture
Cisco Connect 2018 Singapore - Transforming Enterprises in a Multi-Cloud World
Cisco Connect 2018 Singapore - Transforming Enterprises in a Multi-Cloud World
NetworkCollaborators
Cisco Connect 2018 Singapore - Cisco CMX
Cisco Connect 2018 Singapore - Cisco CMX
NetworkCollaborators
Cisco 2015 Midyear Security Report Slide Deck
Cisco 2015 Midyear Security Report Slide Deck
Cisco Security
Presentation cisco cloud security
Presentation cisco cloud security
xKinAnx
How Zero Trust Makes the Mission Simple & Secure
How Zero Trust Makes the Mission Simple & Secure
scoopnewsgroup
Secure Data Center for Enterprise— Threat Management with NextGen IPS
Secure Data Center for Enterprise— Threat Management with NextGen IPS
Cisco Russia
Advance security in cloud computing for military weapons
Advance security in cloud computing for military weapons
IRJET Journal
The Polytechnic of Namibia
The Polytechnic of Namibia
Cisco Case Studies
Automatizovaná bezpečnost – nadstandard nebo nutnost?
Automatizovaná bezpečnost – nadstandard nebo nutnost?
MarketingArrowECS_CZ
Cloud Security
Cloud Security
The TNS Group
Business Continuity and app Security
Business Continuity and app Security
Cristian Garcia G.
Top 5 reasons to purchase cisco asa 5500 series
Top 5 reasons to purchase cisco asa 5500 series
IT Tech
Cy Cops Company Presentation
Cy Cops Company Presentation
ChaitanyaS
La actualidad más candente
(20)
Introduction to Cloud Security
Introduction to Cloud Security
Cisco Connect 2018 Singapore - Easing the Transition
Cisco Connect 2018 Singapore - Easing the Transition
Tomorrow Starts Here - Security Everywhere
Tomorrow Starts Here - Security Everywhere
Cisco Connect 2018 Singapore - Changing the Security Equation
Cisco Connect 2018 Singapore - Changing the Security Equation
Cisco Connect 2018 Thailand - Cisco Meraki an innovation journey to a smarter...
Cisco Connect 2018 Thailand - Cisco Meraki an innovation journey to a smarter...
Securing_your_Internet_of_Things_from_the_ground_up_white_paper_EN_US
Securing_your_Internet_of_Things_from_the_ground_up_white_paper_EN_US
CCSK, cloud security framework, Indonesia
CCSK, cloud security framework, Indonesia
Cisco Connect 2018 Singapore - Transforming Enterprises in a Multi-Cloud World
Cisco Connect 2018 Singapore - Transforming Enterprises in a Multi-Cloud World
Cisco Connect 2018 Singapore - Cisco CMX
Cisco Connect 2018 Singapore - Cisco CMX
Cisco 2015 Midyear Security Report Slide Deck
Cisco 2015 Midyear Security Report Slide Deck
Presentation cisco cloud security
Presentation cisco cloud security
How Zero Trust Makes the Mission Simple & Secure
How Zero Trust Makes the Mission Simple & Secure
Secure Data Center for Enterprise— Threat Management with NextGen IPS
Secure Data Center for Enterprise— Threat Management with NextGen IPS
Advance security in cloud computing for military weapons
Advance security in cloud computing for military weapons
The Polytechnic of Namibia
The Polytechnic of Namibia
Automatizovaná bezpečnost – nadstandard nebo nutnost?
Automatizovaná bezpečnost – nadstandard nebo nutnost?
Cloud Security
Cloud Security
Business Continuity and app Security
Business Continuity and app Security
Top 5 reasons to purchase cisco asa 5500 series
Top 5 reasons to purchase cisco asa 5500 series
Cy Cops Company Presentation
Cy Cops Company Presentation
Destacado
The Evolution of and Need for Secure Network Access
The Evolution of and Need for Secure Network Access
Cisco Security
Mar Camacho, Universitat Rovira i Virgili Faculty (Spain), Visiting scholar a...
Mar Camacho, Universitat Rovira i Virgili Faculty (Spain), Visiting scholar a...
MobileCreation
Demografi profil gampong kulu
Demografi profil gampong kulu
Arya Ningrat
Catalog of prime-industrial-components
Catalog of prime-industrial-components
Prime Industrial Components
Conseqüències de la II Guerra Mundial
Conseqüències de la II Guerra Mundial
malueva
Kelompok 9
Kelompok 9
agung_setiawan_57
To Papsie <3
To Papsie <3
Jeanz Wearable
Paola Voci, «In support of lightness: mobile phones and transient cultures »
Paola Voci, «In support of lightness: mobile phones and transient cultures »
MobileCreation
Analytics cultures in Europe (Web Analytics Congress de Utrecht 13-14 marzo 2...
Analytics cultures in Europe (Web Analytics Congress de Utrecht 13-14 marzo 2...
FLUZO
Lan presentation ed tech 541
Lan presentation ed tech 541
amybass
Ian Christie, “Towards a personalised ethnography of mobile communications: m...
Ian Christie, “Towards a personalised ethnography of mobile communications: m...
MobileCreation
Storyboard ikan anyaman kpd 3026
Storyboard ikan anyaman kpd 3026
Affizan Eady
IBM Smarter Commerce Florida 2014 The Furture of Privacy by Aurélie Pols & Bl...
IBM Smarter Commerce Florida 2014 The Furture of Privacy by Aurélie Pols & Bl...
FLUZO
Workshop "Smart cities and communities" @ La Sapienza
Workshop "Smart cities and communities" @ La Sapienza
Saverio Massaro
Roster 2
Roster 2
Arya Ningrat
Republika wawancara
Republika wawancara
Arya Ningrat
Bertamasya ke banda
Bertamasya ke banda
Arya Ningrat
Máy lọc nước Home Pure
Máy lọc nước Home Pure
Jos Trần Danh Đàn
Kasus neurobehaviour ke
Kasus neurobehaviour ke
Arya Ningrat
A Global Marketer's Guide to Privacy
A Global Marketer's Guide to Privacy
FLUZO
Destacado
(20)
The Evolution of and Need for Secure Network Access
The Evolution of and Need for Secure Network Access
Mar Camacho, Universitat Rovira i Virgili Faculty (Spain), Visiting scholar a...
Mar Camacho, Universitat Rovira i Virgili Faculty (Spain), Visiting scholar a...
Demografi profil gampong kulu
Demografi profil gampong kulu
Catalog of prime-industrial-components
Catalog of prime-industrial-components
Conseqüències de la II Guerra Mundial
Conseqüències de la II Guerra Mundial
Kelompok 9
Kelompok 9
To Papsie <3
To Papsie <3
Paola Voci, «In support of lightness: mobile phones and transient cultures »
Paola Voci, «In support of lightness: mobile phones and transient cultures »
Analytics cultures in Europe (Web Analytics Congress de Utrecht 13-14 marzo 2...
Analytics cultures in Europe (Web Analytics Congress de Utrecht 13-14 marzo 2...
Lan presentation ed tech 541
Lan presentation ed tech 541
Ian Christie, “Towards a personalised ethnography of mobile communications: m...
Ian Christie, “Towards a personalised ethnography of mobile communications: m...
Storyboard ikan anyaman kpd 3026
Storyboard ikan anyaman kpd 3026
IBM Smarter Commerce Florida 2014 The Furture of Privacy by Aurélie Pols & Bl...
IBM Smarter Commerce Florida 2014 The Furture of Privacy by Aurélie Pols & Bl...
Workshop "Smart cities and communities" @ La Sapienza
Workshop "Smart cities and communities" @ La Sapienza
Roster 2
Roster 2
Republika wawancara
Republika wawancara
Bertamasya ke banda
Bertamasya ke banda
Máy lọc nước Home Pure
Máy lọc nước Home Pure
Kasus neurobehaviour ke
Kasus neurobehaviour ke
A Global Marketer's Guide to Privacy
A Global Marketer's Guide to Privacy
Similar a Laser Pioneer Secures Network End-to-End to Protect Assets
Insecure mag-19
Insecure mag-19
Ambuj Sharma
Marcegaglia Group
Marcegaglia Group
Cisco Case Studies
Secure Data Center for Enterprise
Secure Data Center for Enterprise
Cisco Russia
UniCredit Business Integrated Solutions
UniCredit Business Integrated Solutions
Cisco Case Studies
Beachbody, LLC
Beachbody, LLC
Cisco Case Studies
PSOIOT-1151.pdf
PSOIOT-1151.pdf
AlekseySolomin
Intercloud_Fabric
Intercloud_Fabric
Paulo Renato
Cisco VMDC Cloud Security 1.0 Design Guide
Cisco VMDC Cloud Security 1.0 Design Guide
Cisco Service Provider
Cloud security with Sage Construction Anywhere
Cloud security with Sage Construction Anywhere
Sage Construction and Real Estate
Understanding Cloud Security - An In-Depth Exploration For Business Growth | ...
Understanding Cloud Security - An In-Depth Exploration For Business Growth | ...
United States Cybersecurity Institute (USCSI®)
UNDERSTANDING CLOUD SECURITY- AN IN-DEPTH EXPLORATION FOR BUSINESS GROWTH.pdf
UNDERSTANDING CLOUD SECURITY- AN IN-DEPTH EXPLORATION FOR BUSINESS GROWTH.pdf
United States Cybersecurity Institute (USCSI®)
Compliance in the Cloud Using Security by Design
Compliance in the Cloud Using Security by Design
Amazon Web Services
Arup
Arup
Cisco Case Studies
IoT Day 2019 Naples - Microsoft Azure Shpere
IoT Day 2019 Naples - Microsoft Azure Shpere
Mirco Vanini
Cisco Fog Computing Solutions: Unleash the Power of the Internet of Things
Cisco Fog Computing Solutions: Unleash the Power of the Internet of Things
HarshitParkar6677
Computing solutions
Computing solutions
Toufik Kaci
CapAug
CapAug
Paulo Renato
Cisco Hybrid Cloud Solution for IT Capacity Augmentation
Cisco Hybrid Cloud Solution for IT Capacity Augmentation
Paulo Renato
Cisco connect winnipeg 2018 simple it leads to simple it management
Cisco connect winnipeg 2018 simple it leads to simple it management
Cisco Canada
Mondi Group
Mondi Group
Cisco Case Studies
Similar a Laser Pioneer Secures Network End-to-End to Protect Assets
(20)
Insecure mag-19
Insecure mag-19
Marcegaglia Group
Marcegaglia Group
Secure Data Center for Enterprise
Secure Data Center for Enterprise
UniCredit Business Integrated Solutions
UniCredit Business Integrated Solutions
Beachbody, LLC
Beachbody, LLC
PSOIOT-1151.pdf
PSOIOT-1151.pdf
Intercloud_Fabric
Intercloud_Fabric
Cisco VMDC Cloud Security 1.0 Design Guide
Cisco VMDC Cloud Security 1.0 Design Guide
Cloud security with Sage Construction Anywhere
Cloud security with Sage Construction Anywhere
Understanding Cloud Security - An In-Depth Exploration For Business Growth | ...
Understanding Cloud Security - An In-Depth Exploration For Business Growth | ...
UNDERSTANDING CLOUD SECURITY- AN IN-DEPTH EXPLORATION FOR BUSINESS GROWTH.pdf
UNDERSTANDING CLOUD SECURITY- AN IN-DEPTH EXPLORATION FOR BUSINESS GROWTH.pdf
Compliance in the Cloud Using Security by Design
Compliance in the Cloud Using Security by Design
Arup
Arup
IoT Day 2019 Naples - Microsoft Azure Shpere
IoT Day 2019 Naples - Microsoft Azure Shpere
Cisco Fog Computing Solutions: Unleash the Power of the Internet of Things
Cisco Fog Computing Solutions: Unleash the Power of the Internet of Things
Computing solutions
Computing solutions
CapAug
CapAug
Cisco Hybrid Cloud Solution for IT Capacity Augmentation
Cisco Hybrid Cloud Solution for IT Capacity Augmentation
Cisco connect winnipeg 2018 simple it leads to simple it management
Cisco connect winnipeg 2018 simple it leads to simple it management
Mondi Group
Mondi Group
Más de Cisco Security
Incident Response Services Template - Cisco Security
Incident Response Services Template - Cisco Security
Cisco Security
Infographic: Security for Mobile Service Providers
Infographic: Security for Mobile Service Providers
Cisco Security
Cisco ISE Reduces the Attack Surface by Controlling Access
Cisco ISE Reduces the Attack Surface by Controlling Access
Cisco Security
Identify Zero-Day Breaches with Cognitive Threat Analytics on Cisco Web Secur...
Identify Zero-Day Breaches with Cognitive Threat Analytics on Cisco Web Secur...
Cisco Security
Pervasive Security Across Your Extended Network
Pervasive Security Across Your Extended Network
Cisco Security
Cisco Web and Email Security Overview
Cisco Web and Email Security Overview
Cisco Security
3 Tips for Choosing a Next Generation Firewall
3 Tips for Choosing a Next Generation Firewall
Cisco Security
AMP Helps Cisco IT Catch 50% More Malware threats
AMP Helps Cisco IT Catch 50% More Malware threats
Cisco Security
A Reality Check on the State of Cybersecurity
A Reality Check on the State of Cybersecurity
Cisco Security
Balance Data Center Security and Performance
Balance Data Center Security and Performance
Cisco Security
The Cost of Inactivity: Malware Infographic
The Cost of Inactivity: Malware Infographic
Cisco Security
Data Center Security Challenges
Data Center Security Challenges
Cisco Security
Enterprise Strategy Group: Security Survey
Enterprise Strategy Group: Security Survey
Cisco Security
Malware and the Cost of Inactivity
Malware and the Cost of Inactivity
Cisco Security
Midsize Business Solutions: Cybersecurity
Midsize Business Solutions: Cybersecurity
Cisco Security
Integrated Network Security Strategies
Integrated Network Security Strategies
Cisco Security
Cisco Addresses the Full Attack Continuum
Cisco Addresses the Full Attack Continuum
Cisco Security
Infonetics Network and Content Security Vendor Scorecard
Infonetics Network and Content Security Vendor Scorecard
Cisco Security
Gartner Newsletter: Cisco TrustSec Deployed Across Enterprise Campus, Branch ...
Gartner Newsletter: Cisco TrustSec Deployed Across Enterprise Campus, Branch ...
Cisco Security
Cisco 2014 Midyear Security Report
Cisco 2014 Midyear Security Report
Cisco Security
Más de Cisco Security
(20)
Incident Response Services Template - Cisco Security
Incident Response Services Template - Cisco Security
Infographic: Security for Mobile Service Providers
Infographic: Security for Mobile Service Providers
Cisco ISE Reduces the Attack Surface by Controlling Access
Cisco ISE Reduces the Attack Surface by Controlling Access
Identify Zero-Day Breaches with Cognitive Threat Analytics on Cisco Web Secur...
Identify Zero-Day Breaches with Cognitive Threat Analytics on Cisco Web Secur...
Pervasive Security Across Your Extended Network
Pervasive Security Across Your Extended Network
Cisco Web and Email Security Overview
Cisco Web and Email Security Overview
3 Tips for Choosing a Next Generation Firewall
3 Tips for Choosing a Next Generation Firewall
AMP Helps Cisco IT Catch 50% More Malware threats
AMP Helps Cisco IT Catch 50% More Malware threats
A Reality Check on the State of Cybersecurity
A Reality Check on the State of Cybersecurity
Balance Data Center Security and Performance
Balance Data Center Security and Performance
The Cost of Inactivity: Malware Infographic
The Cost of Inactivity: Malware Infographic
Data Center Security Challenges
Data Center Security Challenges
Enterprise Strategy Group: Security Survey
Enterprise Strategy Group: Security Survey
Malware and the Cost of Inactivity
Malware and the Cost of Inactivity
Midsize Business Solutions: Cybersecurity
Midsize Business Solutions: Cybersecurity
Integrated Network Security Strategies
Integrated Network Security Strategies
Cisco Addresses the Full Attack Continuum
Cisco Addresses the Full Attack Continuum
Infonetics Network and Content Security Vendor Scorecard
Infonetics Network and Content Security Vendor Scorecard
Gartner Newsletter: Cisco TrustSec Deployed Across Enterprise Campus, Branch ...
Gartner Newsletter: Cisco TrustSec Deployed Across Enterprise Campus, Branch ...
Cisco 2014 Midyear Security Report
Cisco 2014 Midyear Security Report
Último
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
naman860154
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
Principled Technologies
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
ThousandEyes
Evaluating the top large language models.pdf
Evaluating the top large language models.pdf
ChristopherTHyatt
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
hans926745
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
Delhi Call girls
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
Delhi Call girls
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
Safe Software
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
Radu Cotescu
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
Product Anonymous
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
The Digital Insurer
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
The Digital Insurer
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
The Digital Insurer
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
ThousandEyes
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
Enterprise Knowledge
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
Michael W. Hawkins
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
sudhanshuwaghmare1
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
debabhi2
🐬 The future of MySQL is Postgres 🐘
🐬 The future of MySQL is Postgres 🐘
RTylerCroy
Último
(20)
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
Evaluating the top large language models.pdf
Evaluating the top large language models.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
🐬 The future of MySQL is Postgres 🐘
🐬 The future of MySQL is Postgres 🐘
Laser Pioneer Secures Network End-to-End to Protect Assets
1.
© 2013 Cisco
and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 1 of 4 Customer Case Study EXECUTIVE SUMMARY Customer Name: Coherent, Inc. Industry: Manufacturing Location: Santa Clara, CA Number of Employees: 2400 CHALLENGE ● Mitigate inbound, outbound web threats to protect network ● Address cost and staff efficiencies SOLUTION ● Integrate Cloud Web Security to protect web access ● Institute security service-level agreement (SLA) for more complete, cost-effective solution ● Leverage interoperability of range of Cisco Security products RESULTS ● Provides tighter security measures against cyber threats ● Reduces costs by 10 percent through bundling security products ● Supplies more granular reporting for better decision-making Laser Pioneer Secures Network End-to-End to Protect Assets Coherent mitigates against global cyber threats with Cisco Cloud Web Security. Challenge Founded in 1966, Coherent, Inc. (NASDAQ: COHR) is a world leader in photonics-based solutions, primarily lasers, for a range of commercial and scientific research applications. The company designs, manufactures, services, and markets lasers, laser tools, precision optics, and related accessories. Its products are used in microelectronics, scientific research and government programs, original equipment manufacturer components, instrumentation, and materials processing. The company is headquartered in Santa Clara, California, with locations across North America and in Europe and Asia, including 11 manufacturing sites and smaller sales and services locations. With 2400 employees, Coherent is growing at about 10 percent per year, with accelerated expansion in Asia and Europe. Coherent’s IT team recognized that it needed to address the growing proliferation of web threats to its network to safeguard its business and intellectual property. This proliferation put a strain on the team to stay ahead of the explosion of malware, botnets, and other cyber- security challenges worldwide. With a remote sales force and services team, and more than 25 facilities, the company was looking for additional inbound and outbound threat protection. Coherent wanted to help ensure protection down to its smaller offices. The company’s IT team also needed to address cost and time savings, with its resources increasingly limited.
2.
© 2013 Cisco
and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 2 of 4 Solution The company considered several competitive solutions, including Cisco ® Cloud Web Security (CWS), due to its longstanding relationship as a Cisco customer. After careful consideration, the Coherent IT team felt the Cisco CWS would provide the kind of real-time protection from malware infections and improper or uncontrolled web application use that it needed. The inclusion of Cisco Security Intelligence Operations (SIO) to dynamically detect and block threats in real time was of particular interest. The extension of the protection to mobile users with Cisco AnyConnect ® Secure Mobility Client is a critical feature for Coherent’s remote sales team. The tight integration with Cisco ASA 5500 Series Adaptive Security Appliances and ISR G2 routers allows extended coverage without the expense of additional hardware. The company already uses Cisco AnyConnect VPN for its subcontractor community and third-party partners, and it uses Cisco ASA firewalls, so this simplified the deployment. By bundling its security solutions together through the Cisco Security Enterprise License Agreement (ELA), Coherent found it could cost-effectively mitigate against security threats with a more complete coverage. “In IT, it’s all about having to do more with less these days,” says Bryan Wise, director of information technology, Coherent. “We already had experienced maintenance savings of about 70 percent by bundling Cisco’s firewall functionality with IPS and with the VPN a few years ago. We were ready to see what other gains we might get through the Cisco Security ELA.” Coherent also has gained additional security protections from the Cisco Intrusion Prevention System (IPS), integrated with the ASA firewalls, a significant feature for the company. The inclusion of the Cisco Web Security Appliance (WSA), as well as Cloud Web Security integration on the ISR G2, in several locations provides an additional measure of security, with the integrated web security solution giving them a choice of using McAfee or Sophos anti-virus/anti-malware. Cisco Email Security Appliance (ESA) has been smoothly implemented in Coherent’s environment of 2400 mailboxes. Through the ELA, the subscription is included, such that as the company adds offices, it can more easily add users. Plans to deploy Cisco Identity Services Engine (ISE) are developing to provide network endpoint protection for employee PCs and printers, through 802.1X authentication in their wired environment. This protection will also be extended to their conference rooms. “Having the entire security suite at our fingertips has given us agility to enhance our toolbox on the fly. It’s been easy to manage, and we don’t need to worry about whether to add security elements when we order routers or firewalls; they just come included.” — Bryan Wise, Director of Information Technology
3.
© 2013 Cisco
and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 3 of 4 PRODUCT LIST Security ● Cisco Security Enterprise License Agreement (ELA) ● Cisco ASA 5500 Series Adaptive Security Appliance ● Cisco AnyConnect Secure Mobility Client ● Cisco Intrusion Prevention System (IPS) ● Cisco Cloud Web Security ● Cisco Cloud Email Security ● Cisco Web Security Appliance ● Cisco Identity Services Engine (ISE) Routers and Switches ● Cisco ISR G2 Routers ● Cisco Catalyst ® 3750 and 6500 series Data Center ● Cisco Unified Computing System™ (UCS® ) C series ● Cisco Nexus ® 5500 series Services ● Cisco Security IntelliShield ® Results The Cisco Security ELA gives Coherent a single point of contact within Cisco to manage its comprehensive suite of products and services. It also provides a blanket policy for implementation of new products with a specific level of security. “Since we rely so much on Cisco security, it was a bit of a no- brainer,” says Wise. “We have identified a number of new features we now use, including botnet tracking functionality, and other products that were easy to turn on, because it’s all bundled together.” “The cost savings by having all security products bundled together versus purchasing one by one has been approximately 10 percent,” says Wise. According to Wise, the Coherent team has leveraged Cisco Cloud Web Security to provide integrated protection with the Cisco ISR G2 routers, which more adeptly secures the company’s smaller sites. “Having the entire security suite at our fingertips has given us agility to enhance our toolbox on the fly,” Wise says. “It’s been easy to manage, and we don’t need to worry about whether to add security elements when we order routers or firewalls; they just come included.” The result is a time savings to the IT staff of 35 percent in reduced configuration and implementation support. Coherent benefits from a high, consistent level of security on its network worldwide, so it can continue to grow and focus on its business, he says. For More Information To find out more about Cisco Cloud Web Security, ASA 5500 Series Adaptive Security Appliance, Web Security Appliance, Cloud Email Security, AnyConnect, Intrusion Prevention System, Identity Services Engine and ISR G2 routers, go to: http://www.cisco.com/go/asa http://www.cisco.com/go/anyconnect http://www.cisco.com/go/ips http://www.cisco.com/go/cloudwebsecurity http://www.cisco.com/go/emailsecurity http://www.cisco.com/go/websecurity http://www.cisco.com/go/ise http://www.cisco.com/go/routersecurity
4.
© 2013 Cisco
and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 4 of 4 Printed in USA C36-729889-01 12/13
Descargar ahora