Monday, January 13, 2025
No Result
View All Result
Iced Coffee Hours
  • Home
  • News
    • USA
    • Europe
    • Africa
    • Middle East
    • Asia Pacific
    • Canada
    • UK
    • India
    • Australia
    • New Zealand
  • Politics
  • Business
  • Health
  • Sports
  • Economy
  • Entertainment
  • Crypto
  • Tech
  • Gossips
  • Lifestyle
  • Travel
  • Home
  • News
    • USA
    • Europe
    • Africa
    • Middle East
    • Asia Pacific
    • Canada
    • UK
    • India
    • Australia
    • New Zealand
  • Politics
  • Business
  • Health
  • Sports
  • Economy
  • Entertainment
  • Crypto
  • Tech
  • Gossips
  • Lifestyle
  • Travel
No Result
View All Result
Iced Coffee Hours
No Result
View All Result

Synergizing Cybersecurity: The Benefits of Technology Alliances

September 20, 2024
in Business
Reading Time: 8 mins read
0 0
A A
0
Home Business
Share on FacebookShare on Twitter


Since we adopted an open ecosystems approach, we have witnessed numerous integrations made available by Cisco Security and our technology partners. These integrations aim to improve the cybersecurity posture and defenses of our mutual customers due to their collaborative nature.

These partnerships enable the creation of more comprehensive, effective and efficient cybersecurity solutions. As cyber threats continue to evolve, these collaborations play an increasingly crucial role in helping organizations protect their digital assets. By utilizing these integrated solutions, businesses can establish a stronger security posture and be better prepared to face the challenges presented by today’s digital landscape. Vendor openness fosters better synergy and outcomes for the state of cybersecurity.

The strength of our integrations was put to the test at significant events such as RSAC, Black Hat, NFL Superbowl LVIII and the Paris Olympics. In these events, Cisco Security and our technology partners worked together in the Network & Security operations centers and effectively safeguarded these events from threats, ensuring the safety of people and infrastructure.

As we wrap up our fiscal year 2024, our open and inclusive cybersecurity technology alliance, Cisco Security Technical Alliance, now boasts over 400 technology partners and 825 integrations across Cisco’s cybersecurity product portfolio. In our annual roundup, Cisco Security extends a warm welcome to all new and expanding technology partners in our ecosystem. Deploying these integrated solutions together fosters a “synergy” that aids in more efficiently addressing customer security issues.

To learn more about each partner integration in this announcement, please review the individual partner highlights below. For more details on the partners, please visit our webpage at Cisco Security Technical Alliance.

Happy Integrating!

More details about our partners and their integrations:

New Cisco Breach Protection Suite integrations

These integrations help customers using Cisco’s Breach Protection Suite establish a stronger security posture.

Atlassian — Jira Cloud

Jira Cloud is built for every member of your software team to plan, track, and manage their work. Jira offers bug tracking, issue tracking, agile project management and more. Enabling this integration in Cisco XDR will make the Jira API available as a target for automation workflows.

Criminal IP

Criminal IP by AI Spera is an AI-powered threat intelligence search engine that offers you the latest data on all internet-connected assets. This integration with Cisco XDR offers real-time insights and risk scoring for IP addresses and domains to gain more information on the findings through Criminal IP’s UI by initiating a search in Criminal IP.

CrowdStrike

Two new Cisco-managed XDR workflows for CrowdStrike were released:

Create Custom IOC: This appears in the pivot menu and allows you to create an IOC in CrowdStrike for an observable.Lift Containment for Hosts:This incident response workflow allows you to lift containment for hosts in CrowdStrike from a playbook or using an automation rule.

CrowdStrike also developed the Cisco Secure Email Gateway Data Connector to ingest Secure Email Gateway data into their Falcon platform. This improves detection of modern threats by unifying security data from endpoints and emails.

Darktrace

Darktrace is a Network Detection and Response (NDR) offering. In Cisco XDR, we enable Darktrace users to leverage it for threat hunting and investigation features. Use the Darktrace integration to query for security detections of observables including IP, hostname and Darktrace device ID.

Elastic Cloud

Enabling this integration in Cisco XDR will make the Elastic Cloud API available as a target for automation workflows, which can be used to do things like send incident data to Elastic search for indexing and retention.

Integrating with ExtraHop Reveal(x) Enterprise allows you to automatically search for devices, add or remove devices from a watchlist and search for detections. This integration with Cisco XDR also creates an HTTP target automatically in Automation for out-of-box workflows.

LevelBlue (AlienVault)

The AlienVault Open Threat Exchange (OTX) is the world’s most authoritative open threat information sharing and analysis network. AlienVault OTX integration with Cisco XDR allows OTX Activity Feed data to be used to enhance the threat detection capabilities in XDR.

Microsoft

Microsoft Azure Active Director — Users: Microsoft Azure AD with Cisco XDR provides user and device information to the Cisco XDR Assets feature. It enriches investigations and incident triage and response with device and user context.

Microsoft Defender of Endpoint: In Cisco XDR, we enable Defender for Endpoint users to leverage it for threat hunting and investigation features, as well as rapid response actions to understand and defend against threats on the endpoint. It also provides important device inventory context to help triage detected threats.

Microsoft Defender for Office 365: In Cisco XDR, we enable Defender for Office 365 users to leverage email intelligence and detections while performing incident investigations and threat hunting.

NetApp

NetApp-Volume-Snapshot: The workflow performs a volume snapshot operation on all volumes in a NetApp ONTAP system, excluding those specified in the Skip Volumes input variable. It can be triggered by Cisco XDR for automated response actions or playbooks to protect volume data during a threat response.

Enabling this integration in Cisco XDR will make the PagerDuty REST and Events APIs available as targets for automation workflows. Workflows can be used to do things like send a page through PagerDuty when Cisco XDR incidents are generated.

Palo Alto Networks

Palo Alto Panorama — Add IP, Domain, or URL to Group or Category: This Cisco XDR workflow appears in the pivot menu and allows you to add a URL, IP or domain name to a group or category in Palo Alto Panorama.

Pure Storage

Pure Storage Volume Snapshot: This Cisco XDR workflow performs a volume snapshot operation on the set of volumes configured on the Flash Array (On-Premises Target) using the names provided as an input variable.

Pure Storage Protection Group Snapshot: This workflow performs a Protection Group snapshot operation on the set of protection group volumes configured on the Flash Array (On-Premises Target) using the names provided as an input variable.

Pure Storage Delete User: This workflow performs a user deletion on the Flash Array (On-Premises Target) using the names provided as an input variable.

Red Sift

Red Sift Pulse provides IP, hostname, and domain-based threat intelligence to Cisco XDR users to aid swift identification and remediation of phishing and impersonation attacks. By leveraging Red Sift OnDMARC’s email security capabilities, Red Sift Pulse gives security teams complete visibility into and control over what’s happening across their email-sending infrastructure.

Sentinel One

Two new Cisco XDR automation workflows were added for SentinelOne integration.

Add Hash to Blocklist: This workflow appears in the pivot menu and allows you to add a file hash to a blocklist in SentinelOne.

Remove Hash from Blocklist: This workflow appears in the pivot menu and allows you to remove a file hash to a blocklist in SentinelOne.

ServiceNow

Enabling this integration in Cisco XDR will make the ServiceNow API available as a target for Automation workflows. This target can be used to perform tasks such as creating incidents, creating change tickets and more.

Slack

Slack brings team communication and collaboration into one place so you can get more work done, whether you belong to a large enterprise or a small business. This integration allows Cisco XDR users to leverage Slack as a team collaboration and communication tool in Automation workflows, including incident notification and response.

xMatters

The xMatters service reliability platform helps DevOps, SREs and Ops teams automate workflows, ensure infrastructure availability and deliver products at scale. The integration with Cisco XDR makes the xMatters API available as a target for automation workflows.

New Cisco Cloud Protection Suite integrations

These integrations help customers using Cisco’s Cloud Protection Suite establish a stronger security posture.

CrowdStrike

Cisco Umbrella Data Connector: Seamlessly ingest Cisco Umbrella Security Service Edge (SSE) data into the CrowdStrike Falcon® platform to gain comprehensive cross-domain visibility of threats throughout your attack surface.

IBM QRadar

Cisco Secure Workload now has a Device Support Module (DSM) for IBM QRadar. The DSM module parses received events from Secure Workload and converts them to a standard taxonomy format that can be displayed in IBM QRadar.

Sevco Security

By integrating with Cisco Umbrella and correlating the data there with other tools, Sevco provides comprehensive asset inventory which can uncover previously unknown vulnerabilities in your environment like missing security controls, misconfigured agents, out-of-date software and more.

New Cisco User Protection Suite integrations

These integrations help customers using Cisco’s User Protection Suite establish a stronger security posture.

Google

Google Chrome Device Trust Connector: The Duo + Chrome Device Trust Connector helps organizations easily enforce device posture at the time of authentication and simplifies endpoint trust access policy management through a simple, agentless configuration for MacOS, Windows and ChromeOS.

Google Chronicle updated its integration with Cisco ISE. This new integration with ISE extends the existing one with Chronicle SIEM.

Microsoft

Microsoft Entra ID External Authentication Methods (EAM): Duo was one of the first partners to build an integration with Microsoft’s new framework for integrating with third-party authentication providers, External Authentication Methods. With EAM, Duo is a fully integrated MFA and advanced identity secure identity provider within Entra ID. Duo is supported across all Microsoft workflows including Microsoft Partner Center.

Duo SSO integrations

Organizations can easily protect access to their applications with Duo SSO and enjoy all the benefits of our continuous identity solution. Duo SSO is simple to set up and deploy, making it easy for end users to access the applications they need, without the hassle of remembering passwords. Additionally, Duo SSO combines Duo’s authentication capabilities, such as MFA and Passwordless, with powerful security insights into identity and device risk. This provides organizations with a robust tool to safeguard their users, data, and applications.

Our Duo SSO team has been actively building integrations with the top applications that organizations use. Here is a list of the some of the FY24 new Duo SSO integrations:

Amazon (14 product integrations)AbsoluteAuth0AuvikBarracudaBitwardenCitrix WorkspaceDattoDelineaElasticFortinetGitLabGoogle Apigee XGoogle WorkspacesHackerOneHubspotHuntressIslandKnowBe4ManageEngine (18 product integrations)NetScalerNinjaOneOktaPing IdentitySentinelOneTracelessTenableZoho (2 product integrations)

New Cisco Secure Firewall integrations

These integrations help customers using Cisco Secure Firewall establish a stronger security posture.

Blumira

By collecting logs from Cisco Secure Firewall, Blumira’s Automated Cloud SIEM makes advanced detection and response easy and effective for small and medium-sized businesses, accelerating ransomware and breach prevention.

CrowdStrike

CrowdStrike Falcon Insight XDR ingests cross-domain telemetry from Cisco Secure Firewall ASA to enable unified and threat-centric detection across an organization’s infrastructure.

Titania

Titania Nipper Enterprise accurately assesses the security and compliance status of Cisco Secure Firewall and Secure Firewall ASA regularly to make sure all configurations are up to date and compliance goals are met and maintained.

Tufin

Tufin now supports Cisco Cloud Delivered FMC for Tufin Orchestration Suite, which is a centralized security management layer allowing organizations to define and implement a comprehensive security policy and rapidly automate network changes while remaining compliant to that policy.

Acknowledgements: Thank you to my amazing teammates. Their collaboration with our technology partners has been instrumental in expanding our ecosystem — Jessica Oppenheimer, Ryan Maclennan, Dinkar Sharma, Correine Wiechec, Ginger Leishman, Jenn Kwok, Ben Greenbaum and Apostolos Kouloukourgiotis.

We’d love to hear what you think. Ask a Question, Comment Below, and Stay Connected with Cisco Security on social!

Cisco Security Social Channels

InstagramFacebookTwitterLinkedIn

Share:



Source link

Tags: alliancesbenefitsCybersecuritySynergizingTechnology
Previous Post

Floods force thousands more to flee floods – King Charles expresses ‘sadness’

Next Post

Tips for Spring backpacking

Related Posts

Justice Department Finds 1921 Tulsa Race Massacre ‘Coordinated, Systematic Attack’
Business

Justice Department Finds 1921 Tulsa Race Massacre ‘Coordinated, Systematic Attack’

January 13, 2025
Average house seller in 2024 ‘made £91,820 more than they originally paid’
Business

Average house seller in 2024 ‘made £91,820 more than they originally paid’

January 13, 2025
All the PDF Tools You Need in One Easy-to-Use App | Entrepreneur
Business

All the PDF Tools You Need in One Easy-to-Use App | Entrepreneur

January 12, 2025
Former NFL Defensive End Robert Quinn Arrested After Hit And Run
Business

Former NFL Defensive End Robert Quinn Arrested After Hit And Run

January 12, 2025
Say Hello to the PDF Multi-Tool You Didn’t Know You Needed | Entrepreneur
Business

Say Hello to the PDF Multi-Tool You Didn’t Know You Needed | Entrepreneur

January 11, 2025
HMRC self-assessment deadline fast approaching – with new rules for Vinted sellers
Business

HMRC self-assessment deadline fast approaching – with new rules for Vinted sellers

January 11, 2025
Next Post
Tips for Spring backpacking

Tips for Spring backpacking

Prisoner dons guard’s uniform, attempts escape from Windsor jail

Prisoner dons guard's uniform, attempts escape from Windsor jail

  • Trending
  • Comments
  • Latest
NFT Market Sees Over 30% Decline in Weekly Sales – Markets and Prices Bitcoin News

NFT Market Sees Over 30% Decline in Weekly Sales – Markets and Prices Bitcoin News

May 4, 2024
Bitcoin Surges Past 0K for the First Time Since December, Hits 2,514 High – Markets and Prices Bitcoin News

Bitcoin Surges Past $100K for the First Time Since December, Hits $102,514 High – Markets and Prices Bitcoin News

January 6, 2025
Bitcoin Technical Analysis: Bulls Eye 0K as Resistance Weakens – Markets and Prices Bitcoin News

Bitcoin Technical Analysis: Bulls Eye $100K as Resistance Weakens – Markets and Prices Bitcoin News

January 5, 2025
Brentford came ´close to perfection´ in Southampton rout, says Frank – Soccer News

Brentford came ´close to perfection´ in Southampton rout, says Frank – Soccer News

January 4, 2025
VC Chamath Palihapitiya Predicts Stablecoin Adoption Will Challenge Visa’s and Mastercard’s Duopoly in 2025 – Crypto News Bitcoin News

VC Chamath Palihapitiya Predicts Stablecoin Adoption Will Challenge Visa’s and Mastercard’s Duopoly in 2025 – Crypto News Bitcoin News

January 5, 2025
MARA Holdings Loans 7,377 BTC to Third Parties Amid Bold Yield Strategy – Mining Bitcoin News

MARA Holdings Loans 7,377 BTC to Third Parties Amid Bold Yield Strategy – Mining Bitcoin News

January 5, 2025
FDIC Operation Chokepoint 2.0: ‘Bone-Chilling’ Allegations Continue—Vendettas, Secret Arrangements, and Fear of Crypto – Crypto News Bitcoin News

FDIC Operation Chokepoint 2.0: ‘Bone-Chilling’ Allegations Continue—Vendettas, Secret Arrangements, and Fear of Crypto – Crypto News Bitcoin News

January 13, 2025
Dazzling Ice Castles draw tourists to New Hampshire, other states

Dazzling Ice Castles draw tourists to New Hampshire, other states

January 13, 2025
Man in his 70s dies following road crash in Abbeyfeale, Co Limerick

Man in his 70s dies following road crash in Abbeyfeale, Co Limerick

January 13, 2025
Senior woman Naxalite, associate held in Chhattisgarh’s Kanker

Senior woman Naxalite, associate held in Chhattisgarh’s Kanker

January 13, 2025
‘Severance’, Plus 6 Things to Watch on TV This Week

‘Severance’, Plus 6 Things to Watch on TV This Week

January 13, 2025
Baker Mayfield’s disastrous fumble changed everything for Buccaneers in crushing loss to Commanders

Baker Mayfield’s disastrous fumble changed everything for Buccaneers in crushing loss to Commanders

January 13, 2025
Iced Coffee Hours

Indulge in the perfect blend of news and refreshment at Iced Coffee Hours. Sip on a daily dose of invigorating stories, expertly brewed by our passionate team of writers. Stay informed with a twist – because news should be as refreshing as your favorite iced coffee.

CATEGORIES

  • Africa
  • Asia Pacific
  • Australia
  • Business
  • Canada
  • Cryptocurrency
  • Economy
  • Entertainment
  • Europe
  • Gossips
  • Health
  • India
  • Lifestyle
  • Middle East
  • New Zealand
  • Politics
  • Sports
  • Technology
  • Travel
  • UK
  • USA

LATEST UPDATES

  • FDIC Operation Chokepoint 2.0: ‘Bone-Chilling’ Allegations Continue—Vendettas, Secret Arrangements, and Fear of Crypto – Crypto News Bitcoin News
  • Dazzling Ice Castles draw tourists to New Hampshire, other states
  • Man in his 70s dies following road crash in Abbeyfeale, Co Limerick
  • Senior woman Naxalite, associate held in Chhattisgarh’s Kanker
  • About us
  • Disclaimer
  • Privacy Policy
  • DMCA
  • Cookie Privacy Policy
  • Terms and Conditions
  • Contact us

Copyright © 2024 Iced Coffee Hours.
Iced Coffee Hours is not responsible for the content of external sites.

No Result
View All Result
  • Home
  • News
    • USA
    • Europe
    • Africa
    • Middle East
    • Asia Pacific
    • Canada
    • UK
    • India
    • Australia
    • New Zealand
  • Politics
  • Business
  • Health
  • Sports
  • Economy
  • Entertainment
  • Crypto
  • Tech
  • Gossips
  • Lifestyle
  • Travel

Copyright © 2024 Iced Coffee Hours.
Iced Coffee Hours is not responsible for the content of external sites.

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In