Product
Game Protection
Anti-Cheat & Anti-Hack
Online Protection
Solutions
FPS Game Solution
SLG Game Solution
Casual Game Solution
MMO Game Solution
Card Game Solution
Help Center
Android
User Manual
Tool Download
FAQ
iOS
User Manual
Tool Download
FAQ
Windows
User Manual
Tool Download
FAQ
Blog
Price
Android
iOS
Windows
Company
About us
Why JikGuard
Contact us
Free Trial
News
Big Data in Security – Part I: TRAC Tools
Recently I had an opportunity to sit down with the talented data scientists from Cisco's Threat Research, Analysis, and Communications (TRAC) team to
Dec. 9, 2013
Your Data, Yourself — in the Marketplace of Me
On a typical day, we leave a vast trail of data in our wake. Our browsing histories, online preferences, shopping habits, work decisions, social
Dec. 5, 2013
To SIEM or Not to SIEM? Part II
The Great Correlate Debate SIEMs have been pitched in the past as "correlation engines" and their special algorithms can take in volumes of logs and filter everything down to just...
Oct. 24, 2013
Making Boring Logs Interesting
This post centers around the practice of logging data - data from applications, devices, and networks - and how the components of data logging can help in the identification and remediation of network events.
Oct. 9, 2013
Ten Simple Ways to Enhance Cyber Security for You and Others
Hi there and welcome to today's U.S. National Cyber Security Awareness Month tip, courtesy of those of us involved in administering and/or contributing to Cisco Security Intelligence Operations!! For...
Oct. 3, 2013
More Effective Threat Visibility Using Identity and Device-Type Context
The focus of this post is on the use of ISE in collaboration with existing Security Event & Information Management (SIEM) and Threat Defense (TD) systems.to help customers automate the analysis of which security events in an environment require immediate attention more accurately and quickly.
Sept. 11, 2013
BREACH, CRIME and Black Hat
During the last three years, the security research community has been having a lot of fun with SSL/TLS uncovering a few nifty attacks. First, in 2011,
Aug. 6, 2013
Seven Things to Complete Before Deploying Cisco Identity Services Engine
Connected devices are spreading like kudzu on the Carolina roadside. Cisco Identity Services Engine (ISE) is a great way to manage the devices on your network and with...
May 29, 2013
Adaptive Radio Modules for the 3600 Series AP: Best of Interop 2013 Finalist
We’ve been really busy but also very thrilled about the work we’re doing to future-proofing the network, and it seems we’re not alone. One of our latest innovations, adaptive radio...
April 17, 2013
Consider the Best Approach for Your BYOD Mobility Environment
Mobile devices have quickly become a mainstay in enterprise environments and continue to be consumer driven, and yet they find their way into our day-to-day business lives. As these new devices are being brought into the work environment by employees, enterprise IT is increasingly being forced to accommodate for business use. This is not new news. We observe this pattern through our customers today and live this phenomenon within our own everyday work environment at Cisco. Here at Cisco, employees have the flexibility to choose their device and to securely connect to voice, video and data services from anywhere under …
April 4, 2013
Answering the Two Most-Asked Questions About the Internet of Everything #IoE
Since Cisco began discussing the Internet of Everything (IoE) last year, two questions have arisen consistently: 1) What is the difference between IoE and
March 18, 2013
Making it Easier for You to do Business with Us – Fixed Price Professional Services from Cisco
Professional services, Consultancy Services, Advanced Services - call them what you will. I can hear you say: “On No! Complexity”. “Now I need to work a Statement of Work”. “I...
Nov. 22, 2012
Prev
1
...
15
16
17
18
19