Security in Collaboration: A Cross-Architecture Approach - Security in the Office

  Рет қаралды 26

Network Solutions, Inc.

Network Solutions, Inc.

Күн бұрын

Part 1 - Security in the Office
In this video, we'll explore the key aspects of securing collaboration tools and network infrastructure within an office environment, based on the presentation "Security in Collaboration: A Cross-Architecture Approach." We'll cover the following topics:
Introduction to Collaboration Security: Understand the importance of securing collaboration components such as Cisco WebEx, CUCM, and Cisco IP phones.
Security for Collaboration Components: Dive into the security measures for various Cisco collaboration services, endpoints, and peripherals.
Agenda Overview: Learn about the primary security tools used in the office, including Cisco ISE, Cisco Secure Firewall, and Meraki MX.
Zero Trust Principles: Discover how to implement Zero Trust security, focusing on proving identity, compliance, and minimal access.
In-Office Security Measures: Examine detailed security considerations for access control and privacy within the office environment.
AAA Framework: Explore the Authentication, Authorization, and Accounting (AAA) framework and its integration with Cisco ISE.
Cisco Secure Firewall: Get insights into the next-generation firewall features for protecting both inbound and outbound traffic in the office.
Meraki MX in the Office: Learn about Meraki MX's role in providing SD-WAN, VPN, and simplified network management for office security.
If you'd like to learn more about secure collaboration or any other business technology solutions chat with the experts at Network Solutions. www.nsi1.com/s...

Пікірлер
Cybersecurity Architecture: Networks
27:31
IBM Technology
Рет қаралды 125 М.
Cute
00:16
Oyuncak Avı
Рет қаралды 12 МЛН
Help Me Celebrate! 😍🙏
00:35
Alan Chikin Chow
Рет қаралды 47 МЛН
Cybersecurity Architecture: Who Are You? Identity and Access Management
31:15
FROM HELPDESK TO NETWORK ADMINSTRATOR!!!
10:25
TheBuffNerd
Рет қаралды 91 М.
Ethical Hacking Job Interview
59:46
The Cyber Mentor
Рет қаралды 64 М.
Cisco Security Suites:  What, How and Why?
6:52
Network Solutions, Inc.
Рет қаралды 755
Day In The Life of a Network Analyst | NOC
8:36
PushToProd
Рет қаралды 201 М.
Collaboration 101: Terminologies and components of On-Prem vs. Cloud Solutions
16:03
Cybersecurity Architecture: Five Principles to Follow (and One to Avoid)
17:34
OSI and TCP IP Models - Best Explanation
19:20
_Drunk Engineer_
Рет қаралды 447 М.
I Recorded My IT Help Desk Phone Interview
10:30
Jamal Gardiner
Рет қаралды 298 М.