Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


12:35 PM
Connect Directly

Cisco Brings SecureX into Full Security Lineup to Cut Complexity

This step is intended to address growing enterprise concerns around security and complexity, both top of mind among CISOs and CIOs.

Cisco today announced plans to bring its SecureX platform into all Cisco Security products and introduced new capabilities to increase visibility, automation, and cloud-based email security.

SecureX is a cloud-native security platform first introduced at the 2020 RSA Conference. It was built to connect Cisco's own security products with existing enterprise security tools and, in doing so, increase visibility across endpoints, applications, networks, and the cloud. SecureX scans traffic from Amazon Web Services, Microsoft Azure, Google Cloud, and private data centers.

The platform debuted alongside Cisco's "2020 CISO Benchmark Report," which found many security leaders struggle with alert fatigue and other challenges when managing a multivendor environment. Eighty-six percent use up to 20 vendors. Of those who report alert fatigue, 93% receive at least 5,000 alerts per day and 17% report 100,000 or more alerts. Businesses with more vendors report longer downtime, higher costs, and more breached records after a cyberattack.

It's not only security leaders who are feeling the effects. Cisco's recently released "CIO Perspectives 2020" study found security and complexity are the top two challenges CIOs face. More than two-thirds surveyed feel they are being stretched too thin, Cisco researchers found.

"The challenge in the security industry is [that] we're not necessarily always helping," says Bret Hartman, CTO of Cisco's Security Business Group. Vendors are always creating new tools to buy and assemble, he adds, complicating the jobs of people who manage and protect them all. 

SecureX, which will be included in all Cisco Security products on June 30, is meant to simplify IT management and reduce the complexity that CIOs and CISOs often struggle to handle. The tool brings data from users' full security infrastructure in a single dashboard, as well as operational and threat metrics, to improve visibility across their network, endpoint, cloud, and applications. Administrators can customize this dashboard by choosing from more than 70 metrics.

Starting June 30, customers who buy Cisco Security tools will have SecureX built in. Existing customers can connect current products to SecureX and tell the tool what they're using so it can pull in the needed data. 

In addition to SecureX's availability in Cisco Security products, the company is introducing a few new protective features. One of these is Cloud Mailbox Defense for Office 365, which is built to provide threat visibility across inbound, outbound, and internal messages, with context to strengthen protection against email-based threats, including phishing, ransomware, and spam. The goal, says Hartman, is to not view email as a stand-alone product but bring the visibility into email-based threats together with data collected from network, cloud, and endpoint threats.  

Today's news also aims to aid security teams grappling with a rapid transition to remote work. SecureX is meant for security admins and users, the people who run security infrastructure for an organization. Admins can use the platform to enable remote work and improve access to security data.

"We've talked about the remote workforce for years," says Hartman. "Most customers are well down that path, but there are few that have transformed all the way." The COVID-19 pandemic has forced businesses in the middle of their transition to quickly adapt to a remote workforce and accelerated any security concerns that played into the decision to support remote workers.

Related Content:

Learn from industry experts in a setting that is conducive to interaction and conversation about how to prepare for that "really bad day" in cybersecurity. Click for more information and to register

Kelly Sheridan is the Staff Editor at Dark Reading, where she focuses on cybersecurity news and analysis. She is a business technology journalist who previously reported for InformationWeek, where she covered Microsoft, and Insurance & Technology, where she covered financial ... View Full Bio

Recommended Reading:

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 7/2/2020
Ripple20 Threatens Increasingly Connected Medical Devices
Kelly Sheridan, Staff Editor, Dark Reading,  6/30/2020
DDoS Attacks Jump 542% from Q4 2019 to Q1 2020
Dark Reading Staff 6/30/2020
Register for Dark Reading Newsletters
White Papers
Current Issue
How Cybersecurity Incident Response Programs Work (and Why Some Don't)
This Tech Digest takes a look at the vital role cybersecurity incident response (IR) plays in managing cyber-risk within organizations. Download the Tech Digest today to find out how well-planned IR programs can detect intrusions, contain breaches, and help an organization restore normal operations.
Flash Poll
The Threat from the Internetand What Your Organization Can Do About It
The Threat from the Internetand What Your Organization Can Do About It
This report describes some of the latest attacks and threats emanating from the Internet, as well as advice and tips on how your organization can mitigate those threats before they affect your business. Download it today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2020-07-02
Apache Guacamole 1.1.0 and older may mishandle pointers involved inprocessing data received via RDP static virtual channels. If a userconnects to a malicious or compromised RDP server, a series ofspecially-crafted PDUs could result in memory corruption, possiblyallowing arbitrary code to be executed...
PUBLISHED: 2020-07-02
A vulnerability in the web-based management interface of Cisco Unified Communications Manager, Cisco Unified Communications Manager Session Management Edition, Cisco Unified Communications Manager IM & Presence Service, and Cisco Unity Connection could allow an unauthenticated, remote attack...
PUBLISHED: 2020-07-02
In versions 3.0.0-3.5.0, 2.0.0-2.9.0, and 1.0.1, when users run the command displayed in NGINX Controller user interface (UI) to fetch the agent installer, the server TLS certificate is not verified.
PUBLISHED: 2020-07-02
In versions 3.0.0-3.5.0, 2.0.0-2.9.0, and 1.0.1, the Neural Autonomic Transport System (NATS) messaging services in use by the NGINX Controller do not require any form of authentication, so any successful connection would be authorized.
PUBLISHED: 2020-07-02
In versions 3.0.0-3.5.0, 2.0.0-2.9.0, and 1.0.1, the NGINX Controller installer starts the download of Kubernetes packages from an HTTP URL On Debian/Ubuntu system.