Product
Game Protection
Anti-Cheat & Anti-Hack
Online Protection
Solutions
FPS Game Solution
SLG Game Solution
Casual Game Solution
MMO Game Solution
Card Game Solution
Help Center
Android
User Manual
Tool Download
FAQ
iOS
User Manual
Tool Download
FAQ
Windows
User Manual
Tool Download
FAQ
Blog
Price
Android
iOS
Windows
Company
About us
Why JikGuard
Contact us
Log in
Free Trial
News
Black Hat Asia 2019: Watch Out for the Secondary Payload
Cisco Security was a proud technology partner in the Network Operations Center (NOC) at Black Hat Asia, providing secure and open Internet access to attendees. See what the NOC discovered.
April 15, 2019
New Perspectives on Software-Defined WAN
The integration of SD-WAN with cloud management functionality into the Cisco family of routers in 2018 excited many of our customers. So what can we look forward to as this technology enters its next phase?
Feb. 20, 2019
Indicators of Compromise and where to find them
Indicators of Compromise (“IOC”) are used to suggest a system has been affected by some form of malware. An Indicator of Compromise can be anything from a
Feb. 10, 2017
To be Effective, Security Needs to Be a Force Multiplier
Effective security is simple, open, and automated. We’ve already talked about simple and open. Now let’s talk about automated. Security admins can relate
Dec. 19, 2016
Cognitive Threat Analytics: Turn Your Proxy Into Security Device
This post was authored by Veronica Valeros, Petr Somol, Martin Rehak and Martin Grill, on behalf of the whole CTA team. Some of us still intuitively believe that our extensively...
Sept. 19, 2016
H1N1: Technical analysis reveals new capabilities
This blog is the first in a 3 part series that will provide an in-depth technical analysis on the H1N1 malware. I’ll be looking at how H1N1 has evolved,
Sept. 13, 2016
The General Behavior of Ransomware
This is the first in a series of blogs about advanced malware Behavioral Indicators Morph Over Time A large part of Threat Grid’s efficacy in determining
Aug. 8, 2016
Pushing Security from Edge to Endpoint
On November 3rd, Cisco announced that we are extending our Security Everywhere strategy with new solutions and services aimed at helping our customers
Nov. 9, 2015
Security Beyond the Sandbox
A few years ago sandboxing technology really came of age in the security industry. The ability to emulate an environment, detonate a file without risk of
Sept. 10, 2015
How AMP Threat Grid Accelerates Incident Response with Artifacts, Content, and Correlation
As a result of Cisco’s acquisition last May, ThreatGRID is now part of the Cisco Advanced Malware Protection (AMP) portfolio as AMP Threat Grid. The
Feb. 9, 2015