Cisco recognized by Forrester as cybersecurity incident response services provider
Cisco Talos Incident Response is proud to announce that Forrester has recognized us by including Cisco in the new Forrester report “Now Tech: Cybersecurity Incident Response Services, Q4 2021.”
The Forrester report provides an overview of 36 Cybersecurity Incident Response Services (CIRS) providers that offer critical incident response and digital forensic expertise during cybersecurity breaches based upon size, capabilities, industry vertical and geography. We are especially pleased to be recognized in this Forrester report as this news comes on the heels of us being named an industry leader in incident readiness as part of an IDC MarketScape report. [Continue reading]
Cisco named a Leader in IR Services
It has been more than two years already since Cisco Incident Response became a part of the Talos family. Since then, my team has continued a journey to simplify our offering for consumption and make incident response the ultimate team sport.
That is why I could not be more humbled to announce that Cisco Talos Incident Response is being recognized as a leader by IDC in the 2021 MarketScape for Worldwide Incident Readiness Services (doc #US46741420, November 2021). Our world-class global incident response team continues to stand next to our customers to help them build resiliency into their processes, procedures, and people. Our customers understand the journey we are on together and turn to Cisco to securely connect, protect, and respond to threats impacting their hybrid workforce. [Continue reading]
Case Study: Incident Response is a relationship-driven business
As a seasoned incident responder, and now IR business leader here at Cisco Talos Incident Response (CTIR), I have always said that incident response is the ultimate team sport. People are building blocks for organizations — and an effective incident response is about people, relationships and leveraging those relationships into the incident response workflow (processes and security instrumentation). This all plays a part in effectively containing and eradicating a determined adversary from the organization’s network environment. [continue reading]