Statements (54)
Predicate | Object |
---|---|
https://www.w3.org/2000/01/rdf-schema#label |
Cisco's security solutions
|
gptkbp:includes |
gptkb:security
cloud security web security VPN solutions email security endpoint security intrusion prevention system |
gptkbp:integrates_with |
gptkb:Cisco_Umbrella
gptkb:Cisco_Identity_Services_Engine gptkb:Cisco_Secure_X |
gptkbp:is_aimed_at |
protecting sensitive data
enhancing security posture reducing risk ensuring business continuity |
gptkbp:is_available_in |
on-premises deployment
cloud-based deployment hybrid deployment |
gptkbp:is_compatible_with |
third-party security tools
|
gptkbp:is_compliant_with |
gptkb:PCI_DSS
gptkb:HIPAA gptkb:GDPR |
gptkbp:is_designed_for |
data protection
incident response network security threat detection |
gptkbp:is_part_of |
gptkb:Cisco_Security_portfolio
Cisco's overall cybersecurity strategy |
gptkbp:is_protected_by |
gptkb:virus
phishing attacks DDo S attacks |
gptkbp:is_recognized_by |
gptkb:Forrester
gptkb:Gartner IDC |
gptkbp:is_scalable |
small businesses
large organizations |
gptkbp:is_supported_by |
gptkb:Cisco_Talos
|
gptkbp:is_updated_by |
threat intelligence feeds
|
gptkbp:is_used_by |
gptkb:educational_institutions
government agencies enterprises |
gptkbp:offers |
security training
security consulting incident response services managed security services |
gptkbp:provides |
automated responses
real-time monitoring user behavior analytics threat intelligence network visibility security analytics |
gptkbp:supports |
compliance requirements
|
gptkbp:bfsParent |
gptkb:Cisco_Io_T_Edge_Computing_Solutions
|
gptkbp:bfsLayer |
5
|