Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Cloud

6/16/2020
12:35 PM
Connect Directly
Twitter
LinkedIn
Google+
RSS
E-Mail
100%
0%

Cisco Brings SecureX into Full Security Lineup to Cut Complexity

This step is intended to address growing enterprise concerns around security and complexity, both top of mind among CISOs and CIOs.

Cisco today announced plans to bring its SecureX platform into all Cisco Security products and introduced new capabilities to increase visibility, automation, and cloud-based email security.

SecureX is a cloud-native security platform first introduced at the 2020 RSA Conference. It was built to connect Cisco's own security products with existing enterprise security tools and, in doing so, increase visibility across endpoints, applications, networks, and the cloud. SecureX scans traffic from Amazon Web Services, Microsoft Azure, Google Cloud, and private data centers.

The platform debuted alongside Cisco's "2020 CISO Benchmark Report," which found many security leaders struggle with alert fatigue and other challenges when managing a multivendor environment. Eighty-six percent use up to 20 vendors. Of those who report alert fatigue, 93% receive at least 5,000 alerts per day and 17% report 100,000 or more alerts. Businesses with more vendors report longer downtime, higher costs, and more breached records after a cyberattack.

It's not only security leaders who are feeling the effects. Cisco's recently released "CIO Perspectives 2020" study found security and complexity are the top two challenges CIOs face. More than two-thirds surveyed feel they are being stretched too thin, Cisco researchers found.

"The challenge in the security industry is [that] we're not necessarily always helping," says Bret Hartman, CTO of Cisco's Security Business Group. Vendors are always creating new tools to buy and assemble, he adds, complicating the jobs of people who manage and protect them all. 

SecureX, which will be included in all Cisco Security products on June 30, is meant to simplify IT management and reduce the complexity that CIOs and CISOs often struggle to handle. The tool brings data from users' full security infrastructure in a single dashboard, as well as operational and threat metrics, to improve visibility across their network, endpoint, cloud, and applications. Administrators can customize this dashboard by choosing from more than 70 metrics.

Starting June 30, customers who buy Cisco Security tools will have SecureX built in. Existing customers can connect current products to SecureX and tell the tool what they're using so it can pull in the needed data. 

In addition to SecureX's availability in Cisco Security products, the company is introducing a few new protective features. One of these is Cloud Mailbox Defense for Office 365, which is built to provide threat visibility across inbound, outbound, and internal messages, with context to strengthen protection against email-based threats, including phishing, ransomware, and spam. The goal, says Hartman, is to not view email as a stand-alone product but bring the visibility into email-based threats together with data collected from network, cloud, and endpoint threats.  

Today's news also aims to aid security teams grappling with a rapid transition to remote work. SecureX is meant for security admins and users, the people who run security infrastructure for an organization. Admins can use the platform to enable remote work and improve access to security data.

"We've talked about the remote workforce for years," says Hartman. "Most customers are well down that path, but there are few that have transformed all the way." The COVID-19 pandemic has forced businesses in the middle of their transition to quickly adapt to a remote workforce and accelerated any security concerns that played into the decision to support remote workers.

Related Content:

 
 
 
 
 
 
Learn from industry experts in a setting that is conducive to interaction and conversation about how to prepare for that "really bad day" in cybersecurity. Click for more information and to register

Kelly Sheridan is the Staff Editor at Dark Reading, where she focuses on cybersecurity news and analysis. She is a business technology journalist who previously reported for InformationWeek, where she covered Microsoft, and Insurance & Technology, where she covered financial ... View Full Bio
 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 8/3/2020
Pen Testers Who Got Arrested Doing Their Jobs Tell All
Kelly Jackson Higgins, Executive Editor at Dark Reading,  8/5/2020
New 'Nanodegree' Program Provides Hands-On Cybersecurity Training
Nicole Ferraro, Contributing Writer,  8/3/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Special Report: Computing's New Normal, a Dark Reading Perspective
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
The Changing Face of Threat Intelligence
The Changing Face of Threat Intelligence
This special report takes a look at how enterprises are using threat intelligence, as well as emerging best practices for integrating threat intel into security operations and incident response. Download it today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-15058
PUBLISHED: 2020-08-07
Lindy 42633 4-Port USB 2.0 Gigabit Network Server 2.078.000 devices allow an attacker on the same network to elevate privileges because the administrative password can be discovered by sniffing unencrypted UDP traffic.
CVE-2020-15059
PUBLISHED: 2020-08-07
Lindy 42633 4-Port USB 2.0 Gigabit Network Server 2.078.000 devices allow an attacker on the same network to bypass authentication via a web-administration request that lacks a password parameter.
CVE-2020-15060
PUBLISHED: 2020-08-07
Lindy 42633 4-Port USB 2.0 Gigabit Network Server 2.078.000 devices allow an attacker on the same network to conduct persistent XSS attacks by leveraging administrative privileges to set a crafted server name.
CVE-2020-15061
PUBLISHED: 2020-08-07
Lindy 42633 4-Port USB 2.0 Gigabit Network Server 2.078.000 devices allow an attacker on the same network to denial-of-service the device via long input values.
CVE-2020-15062
PUBLISHED: 2020-08-07
DIGITUS DA-70254 4-Port Gigabit Network Hub 2.073.000.E0008 devices allow an attacker on the same network to elevate privileges because the administrative password can be discovered by sniffing unencrypted UDP traffic.