Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Cloud

6/16/2020
12:35 PM
Connect Directly
Twitter
LinkedIn
RSS
E-Mail
100%
0%

Cisco Brings SecureX into Full Security Lineup to Cut Complexity

This step is intended to address growing enterprise concerns around security and complexity, both top of mind among CISOs and CIOs.

Cisco today announced plans to bring its SecureX platform into all Cisco Security products and introduced new capabilities to increase visibility, automation, and cloud-based email security.

SecureX is a cloud-native security platform first introduced at the 2020 RSA Conference. It was built to connect Cisco's own security products with existing enterprise security tools and, in doing so, increase visibility across endpoints, applications, networks, and the cloud. SecureX scans traffic from Amazon Web Services, Microsoft Azure, Google Cloud, and private data centers.

The platform debuted alongside Cisco's "2020 CISO Benchmark Report," which found many security leaders struggle with alert fatigue and other challenges when managing a multivendor environment. Eighty-six percent use up to 20 vendors. Of those who report alert fatigue, 93% receive at least 5,000 alerts per day and 17% report 100,000 or more alerts. Businesses with more vendors report longer downtime, higher costs, and more breached records after a cyberattack.

It's not only security leaders who are feeling the effects. Cisco's recently released "CIO Perspectives 2020" study found security and complexity are the top two challenges CIOs face. More than two-thirds surveyed feel they are being stretched too thin, Cisco researchers found.

"The challenge in the security industry is [that] we're not necessarily always helping," says Bret Hartman, CTO of Cisco's Security Business Group. Vendors are always creating new tools to buy and assemble, he adds, complicating the jobs of people who manage and protect them all. 

SecureX, which will be included in all Cisco Security products on June 30, is meant to simplify IT management and reduce the complexity that CIOs and CISOs often struggle to handle. The tool brings data from users' full security infrastructure in a single dashboard, as well as operational and threat metrics, to improve visibility across their network, endpoint, cloud, and applications. Administrators can customize this dashboard by choosing from more than 70 metrics.

Starting June 30, customers who buy Cisco Security tools will have SecureX built in. Existing customers can connect current products to SecureX and tell the tool what they're using so it can pull in the needed data. 

In addition to SecureX's availability in Cisco Security products, the company is introducing a few new protective features. One of these is Cloud Mailbox Defense for Office 365, which is built to provide threat visibility across inbound, outbound, and internal messages, with context to strengthen protection against email-based threats, including phishing, ransomware, and spam. The goal, says Hartman, is to not view email as a stand-alone product but bring the visibility into email-based threats together with data collected from network, cloud, and endpoint threats.  

Today's news also aims to aid security teams grappling with a rapid transition to remote work. SecureX is meant for security admins and users, the people who run security infrastructure for an organization. Admins can use the platform to enable remote work and improve access to security data.

"We've talked about the remote workforce for years," says Hartman. "Most customers are well down that path, but there are few that have transformed all the way." The COVID-19 pandemic has forced businesses in the middle of their transition to quickly adapt to a remote workforce and accelerated any security concerns that played into the decision to support remote workers.

Related Content:

 
 
 
 
 
 
Learn from industry experts in a setting that is conducive to interaction and conversation about how to prepare for that "really bad day" in cybersecurity. Click for more information and to register

Kelly Sheridan is the Staff Editor at Dark Reading, where she focuses on cybersecurity news and analysis. She is a business technology journalist who previously reported for InformationWeek, where she covered Microsoft, and Insurance & Technology, where she covered financial ... View Full Bio
 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
News
Former CISA Director Chris Krebs Discusses Risk Management & Threat Intel
Kelly Sheridan, Staff Editor, Dark Reading,  2/23/2021
Edge-DRsplash-10-edge-articles
Security + Fraud Protection: Your One-Two Punch Against Cyberattacks
Joshua Goldfarb, Director of Product Management at F5,  2/23/2021
News
Cybercrime Groups More Prolific, Focus on Healthcare in 2020
Robert Lemos, Contributing Writer,  2/22/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Building the SOC of the Future
Building the SOC of the Future
Digital transformation, cloud-focused attacks, and a worldwide pandemic. The past year has changed the way business works and the way security teams operate. There is no going back.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-27225
PUBLISHED: 2021-03-01
In Dataiku DSS before 8.0.6, insufficient access control in the Jupyter notebooks integration allows users (who have coding permissions) to read and overwrite notebooks in projects that they are not authorized to access.
CVE-2021-27132
PUBLISHED: 2021-02-27
SerComm AG Combo VD625 AGSOT_2.1.0 devices allow CRLF injection (for HTTP header injection) in the download function via the Content-Disposition header.
CVE-2021-25284
PUBLISHED: 2021-02-27
An issue was discovered in through SaltStack Salt before 3002.5. salt.modules.cmdmod can log credentials to the info or error log level.
CVE-2021-3144
PUBLISHED: 2021-02-27
In SaltStack Salt before 3002.5, eauth tokens can be used once after expiration. (They might be used to run command against the salt master or minions.)
CVE-2021-3148
PUBLISHED: 2021-02-27
An issue was discovered in SaltStack Salt before 3002.5. Sending crafted web requests to the Salt API can result in salt.utils.thin.gen_thin() command injection because of different handling of single versus double quotes. This is related to salt/utils/thin.py.