In this video, we’ll explore the various options available in SecureX orchestration for importing and exporting your workflows and atomic actions.
No Comments
0
You also might be interested in
Keep up with your company’s growth with Cisco SecureX, a cloud native platform that brings all your security products together in an easy to use solution.
In this video, we’ll look at a SecureX orchestration sample workflow that can automatically update a Cisco ASA’s split tunnel configuration with Microsoft Online networks and domains.
In this video, we take a tour of SecureX orchestration and talk about its primary components including targets, account keys, variables, and schedules.
Leave a ReplyYour email is safe with us and you won't be automatically added to a mailing list.
Cancel Reply
Leave a ReplyYour email is safe with us and you won't be automatically added to a mailing list.
Cancel Reply
IT Solutions & Resources
- AI & Cognitive Services (31)
- Analytics (1)
- Business (188)
- Cisco (702)
- Collaboration (17)
- Communication (19)
- Cyber Security (263)
- Data Center & Cloud (29)
- Defendify (39)
- Enterprise Networks (167)
- Events (1)
- FAQ (2)
- Firewall (53)
- Fortinet (337)
- Governance (17)
- Li-Fi Technology (1)
- Microsoft Cloud (11)
- Microsoft Office 365 (61)
- News (1)
- Podcasts (1)
- Uncategorized (406)
- Unified Communications (19)
- Updates (1)
- Video (1,080)
Recent IT & Cyber Security News
- Mitigate Risk and Fortify Agency Security with Fortinet Federal | Federal Cybersecurity April 9, 2021
- “Cyber Safe: A Dog’s Guide to Internet Security” | FortinetLIVE April 8, 2021
- AIOps: Work Smarter with AI/ML in Cisco DNA Center Demo April 8, 2021
- Security is Essential for MVNOs and Their Customers MVNO | Mobile Virtual Network Operator April 7, 2021
IT and Security Reference
antivirus byod cisco Cisco IT cisco webex Cloud cloud security Collaboration cyber cyberattack cybercrime cybercriminal cybersecurity cyberthreat data center endpoint firewall FortiGate Fortinet FortiOS hybrid cloud information technology IoT IT malware Microsoft mobile security network networking network security NGFW Office 365 Private Cloud productivity public cloud ransomware Sandboxing sd-wan sddc sdn security Security Fabric software video webex