array(3) {
["company_details"]=>
array(13) {
["name"]=>
string(27) "CISCO INTERNATIONAL LIMITED"
["slug"]=>
string(36) "8d023-gb-cisco-international-limited"
["logo"]=>
string(84) "https://images.businessradar.com/linkedin_logos/67b7854f-58f3-47d0-b86d-ae1839283873"
["description"]=>
string(1233) "Cisco (NASDAQ: CSCO) enables people to make powerful connections--whether in business, education, philanthropy, or creativity. Cisco hardware, software, and service offerings are used to create the Internet solutions that make networks possible--providing easy access to information anywhere, at any time.
Cisco was founded in 1984 by a small group of computer scientists from Stanford University. Since the company's inception, Cisco engineers have been leaders in the development of Internet Protocol (IP)-based networking technologies. Today, with more than 71,000 employees worldwide, this tradition of innovation continues with industry-leading products and solutions in the company's core development areas of routing and switching, as well as in advanced technologies such as home networking, IP telephony, optical networking, security, storage area networking, and wireless technology. In addition to its products, Cisco provides a broad range of service offerings, including technical support and advanced services.
Cisco sells its products and services, both directly through its own sales force as well as through its channel partners, to large enterprises, commercial businesses, service providers, and consumers."
["address_street"]=>
string(15) "9-11 New Square"
["address_place"]=>
string(7) "FELTHAM"
["address_region"]=>
NULL
["founding_date"]=>
string(10) "2008-07-08"
["website_domain"]=>
string(9) "cisco.com"
["website_url"]=>
string(21) "https://www.cisco.com"
["industry_codes"]=>
array(2) {
[0]=>
string(29) "Computer Programming Services"
[1]=>
string(51) "Computer Related Services, Not Elsewhere Classified"
}
["employee_count"]=>
int(3061)
["article_count"]=>
int(2036)
}
["articles"]=>
array(9) {
[0]=>
array(7) {
["title_en"]=>
string(39) "Big move for cloud security from Cisco!"
["snippet_en"]=>
string(90) "Cisco announced that it acquired Isovalent. The goal is to strengthen multi-cloud security"
["url"]=>
string(69) "https://www.techinside.com/ciscodan-bulut-guvenligi-icin-buyuk-hamle/"
["image_url"]=>
string(78) "https://images.businessradar.com/articles/9042773d-cf2c-41f8-9b02-6694bb7658ac"
["source"]=>
string(14) "techinside.com"
["publication_date"]=>
string(10) "2024-04-13"
["categories"]=>
array(3) {
[0]=>
string(10) "Cybercrime"
[1]=>
string(11) "Acquisition"
[2]=>
string(13) "Data Security"
}
}
[1]=>
array(7) {
["title_en"]=>
string(114) "Summary: Upstream Security Receives Funding from Cisco Investments as Demand for IoT Cybersecurity Solutions Soars"
["snippet_en"]=>
string(139) "Connected vehicles and mobile IoT devices introduce additional layers of cyber risks, creating threats against operational availability and"
["url"]=>
string(177) "https://www.01net.it/riassunto-upstream-security-riceve-un-finanziamento-da-cisco-investments-mentre-aumenta-vertiginosamente-la-richiesta-di-soluzioni-per-la-cybersecurity-iot/"
["image_url"]=>
NULL
["source"]=>
string(8) "01net.it"
["publication_date"]=>
string(10) "2024-04-10"
["categories"]=>
array(2) {
[0]=>
string(10) "Cybercrime"
[1]=>
string(13) "Data Security"
}
}
[2]=>
array(7) {
["title_en"]=>
string(77) "Unlocking the Mystery of VPN Protocols: A Simple Guide to Secure Internet Use"
["snippet_en"]=>
string(140) "Discover the essential guide to VPN protocols, including WireGuard, OpenVPN, and IKEv2, to enhance your online privacy, security, and speed."
["url"]=>
string(99) "https://pc-tablet.com/unlocking-the-mystery-of-vpn-protocols-a-simple-guide-to-secure-internet-use/"
["image_url"]=>
string(78) "https://images.businessradar.com/articles/41c5fd7d-d21e-44db-889b-397a85e838d3"
["source"]=>
string(13) "pc-tablet.com"
["publication_date"]=>
string(10) "2024-04-08"
["categories"]=>
array(1) {
[0]=>
string(13) "Data Security"
}
}
[3]=>
array(7) {
["title_en"]=>
string(47) "Organizations barely prepared for cyber attacks"
["snippet_en"]=>
string(97) "Only three percent of organizations in the Netherlands have a good level of protection against it"
["url"]=>
string(90) "https://www.beveiligingswereld.nl/nieuws/organisaties-nauwelijks-voorbereid-op-cyberaanval"
["image_url"]=>
NULL
["source"]=>
string(21) "beveiligingswereld.nl"
["publication_date"]=>
string(10) "2024-04-08"
["categories"]=>
array(2) {
[0]=>
string(10) "Cybercrime"
[1]=>
string(13) "Data Security"
}
}
[4]=>
array(7) {
["title_en"]=>
string(85) "Vietnamese hackers are suspected of being behind financial data theft attacks in Asia"
["snippet_en"]=>
string(110) "Cisco Talos said the hacker group focused on victims' credentials, financial data and social network accounts."
["url"]=>
string(121) "https://quantrimang.com/lang-cong-nghe/hacker-viet-bi-dung-sau-cac-vu-tan-cong-danh-cap-du-lieu-tai-chinh-o-chau-a-202406"
["image_url"]=>
string(78) "https://images.businessradar.com/articles/3797633e-03d3-45b4-b003-d9e824a35333"
["source"]=>
string(15) "quantrimang.com"
["publication_date"]=>
string(10) "2024-04-08"
["categories"]=>
array(2) {
[0]=>
string(10) "Cybercrime"
[1]=>
string(13) "Data Security"
}
}
[5]=>
array(7) {
["title_en"]=>
string(90) "Cisco security researchers uncover ArcaneDoor espionage campaign by state-sponsored actors"
["snippet_en"]=>
string(243) "Cisco researchers working with cybersecurity researchers from around the world, have found evidence of sophisticated hacking group backed by a state. This group has been targeting the perimeter devices of companies, with the goal of espionage."
["url"]=>
string(145) "https://www.news9live.com/technology/tech-news/cisco-security-researchers-uncover-arcanedoor-espionage-campaign-by-state-sponsored-actors-2511029"
["image_url"]=>
string(78) "https://images.businessradar.com/articles/8316191d-da8b-4403-9879-1a6f44698a6f"
["source"]=>
string(13) "news9live.com"
["publication_date"]=>
string(10) "2024-04-02"
["categories"]=>
array(3) {
[0]=>
string(10) "Cybercrime"
[1]=>
string(13) "Data Security"
[2]=>
string(21) "Cultural developments"
}
}
[6]=>
array(7) {
["title_en"]=>
string(82) "This is how Cisco's Hypershield will revolutionize the fight against cyber threats"
["snippet_en"]=>
string(268) "Cisco has unveiled a brand new cyber security platform based on cutting-edge technology and a new way of thinking. The goal: To change the balance of power in the fight against cybercrime and, for the first time, give the defenders the upper hand against the attacker."
["url"]=>
string(100) "https://www.nyteknik.se/sponsrad/sa-ska-ciscos-hypershield-revolutionera-kampen-mot-cyberhot/4254604"
["image_url"]=>
string(78) "https://images.businessradar.com/articles/ff3ad97e-371d-4069-9a46-217277d34f10"
["source"]=>
string(11) "nyteknik.se"
["publication_date"]=>
string(10) "2024-04-02"
["categories"]=>
array(3) {
[0]=>
string(10) "Cybercrime"
[1]=>
string(13) "Data Security"
[2]=>
string(14) "Product Launch"
}
}
[7]=>
array(7) {
["title_en"]=>
string(69) "Cisco Hypershield: AI at the center of a new ubiquitous cybersecurity"
["snippet_en"]=>
string(272) "The words of Jeetu Patel, executive vice president and general manager of Security and Collaboration at Cisco in the pre-launch session, in which this media participated, set expectations: the complexity of data centers that are supporting the AI ​​revolution has been"
["url"]=>
string(107) "https://www.enfasys.net/2024/04/19/cisco-hypershield-la-ia-en-el-centro-de-una-nueva-ciberseguridad-ubicua/"
["image_url"]=>
NULL
["source"]=>
string(11) "enfasys.net"
["publication_date"]=>
string(10) "2024-04-01"
["categories"]=>
array(1) {
[0]=>
string(13) "Data Security"
}
}
[8]=>
array(7) {
["title_en"]=>
string(70) "Cisco Hypershield: AI at the service of data center and cloud security"
["snippet_en"]=>
string(139) "Cisco presents Hypershield, the solution that revolutionizes data center and cloud protection thanks to the use of artificial intelligence."
["url"]=>
string(133) "https://www.innovationpost.it/tecnologie/industrial-security/cisco-hypershield-lai-a-servizio-della-sicurezza-di-data-center-e-cloud/"
["image_url"]=>
string(78) "https://images.businessradar.com/articles/d55abd40-39a2-447b-abdc-6344aad40c3c"
["source"]=>
string(17) "innovationpost.it"
["publication_date"]=>
string(10) "2024-04-01"
["categories"]=>
array(4) {
[0]=>
string(10) "Cybercrime"
[1]=>
string(16) "Customer Privacy"
[2]=>
string(13) "Data Security"
[3]=>
string(13) "Collaboration"
}
}
}
["category_annotations"]=>
array(30) {
[0]=>
array(2) {
["name"]=>
string(13) "Data Security"
["count"]=>
int(276)
}
[1]=>
array(2) {
["name"]=>
string(13) "Collaboration"
["count"]=>
int(239)
}
[2]=>
array(2) {
["name"]=>
string(10) "Cybercrime"
["count"]=>
int(230)
}
[3]=>
array(2) {
["name"]=>
string(14) "Product Launch"
["count"]=>
int(134)
}
[4]=>
array(2) {
["name"]=>
string(5) "R & D"
["count"]=>
int(98)
}
[5]=>
array(2) {
["name"]=>
string(11) "Acquisition"
["count"]=>
int(89)
}
[6]=>
array(2) {
["name"]=>
string(16) "Customer Privacy"
["count"]=>
int(76)
}
[7]=>
array(2) {
["name"]=>
string(12) "Stock Market"
["count"]=>
int(74)
}
[8]=>
array(2) {
["name"]=>
string(18) "Expansion & Growth"
["count"]=>
int(64)
}
[9]=>
array(2) {
["name"]=>
string(41) "E-commerce and Technological Developments"
["count"]=>
int(58)
}
[10]=>
array(2) {
["name"]=>
string(24) "Quarterly/Annual Figures"
["count"]=>
int(57)
}
[11]=>
array(2) {
["name"]=>
string(15) "Market Movement"
["count"]=>
int(53)
}
[12]=>
array(2) {
["name"]=>
string(25) "Business Model Resilience"
["count"]=>
int(49)
}
[13]=>
array(2) {
["name"]=>
string(20) "Business Development"
["count"]=>
int(48)
}
[14]=>
array(2) {
["name"]=>
string(18) "General Investment"
["count"]=>
int(44)
}
[15]=>
array(2) {
["name"]=>
string(31) "Financial Update/Profit Warning"
["count"]=>
int(43)
}
[16]=>
array(2) {
["name"]=>
string(12) "Board Change"
["count"]=>
int(40)
}
[17]=>
array(2) {
["name"]=>
string(5) "Legal"
["count"]=>
int(40)
}
[18]=>
array(2) {
["name"]=>
string(7) "Layoffs"
["count"]=>
int(36)
}
[19]=>
array(2) {
["name"]=>
string(5) "Event"
["count"]=>
int(36)
}
[20]=>
array(2) {
["name"]=>
string(5) "Award"
["count"]=>
int(32)
}
[21]=>
array(2) {
["name"]=>
string(15) "Deals & Tenders"
["count"]=>
int(30)
}
[22]=>
array(2) {
["name"]=>
string(12) "Staff hiring"
["count"]=>
int(24)
}
[23]=>
array(2) {
["name"]=>
string(19) "Green & Responsible"
["count"]=>
int(23)
}
[24]=>
array(2) {
["name"]=>
string(23) "Supply Chain Management"
["count"]=>
int(22)
}
[25]=>
array(2) {
["name"]=>
string(21) "Competitive Behaviour"
["count"]=>
int(22)
}
[26]=>
array(2) {
["name"]=>
string(17) "Energy Management"
["count"]=>
int(22)
}
[27]=>
array(2) {
["name"]=>
string(17) "Academic Research"
["count"]=>
int(21)
}
[28]=>
array(2) {
["name"]=>
string(11) "Competition"
["count"]=>
int(21)
}
[29]=>
array(2) {
["name"]=>
string(37) "Product Design & Lifecycle Management"
["count"]=>
int(17)
}
}
}
8d023-gb-cisco-international-limited
CISCO INTERNATIONAL LIMITED
Location
Founded
2008-07-08
Website
https://www.cisco.com
Articles
2036 Articles
Category
Computer Programming Services
Computer Related Services, Not Elsewhere Classified
Description
Cisco (NASDAQ: CSCO) enables people to make powerful connections--whether in business, education, philanthropy, or creativity. Cisco hardware, software, and service offerings are used to create the Internet solutions that make networks possible--providing easy access to information anywhere, at any time.
Cisco was founded in 1984 by a small group of computer scientists from Stanford University. Since the company's inception, Cisco engineers have been leaders in the development of Internet Protocol (IP)-based networking technologies. Today, with more than 71,000 employees worldwide, this tradition of innovation continues with industry-leading products and solutions in the company's core development areas of routing and switching, as well as in advanced technologies such as home networking, IP telephony, optical networking, security, storage area networking, and wireless technology. In addition to its products, Cisco provides a broad range of service offerings, including technical support and advanced services.
Cisco sells its products and services, both directly through its own sales force as well as through its channel partners, to large enterprises, commercial businesses, service providers, and consumers.
Cisco researchers working with cybersecurity researchers from around the world, have found evidence of sophisticated hacking group backed by a state. This group has been targeting the perimeter devices of companies, with the goal of espionage.
Cisco has unveiled a brand new cyber security platform based on cutting-edge technology and a new way of thinking. The goal: To change the balance of power in the fight against cybercrime and, for the first time, give the defenders the upper hand against the attacker.
The words of Jeetu Patel, executive vice president and general manager of Security and Collaboration at Cisco in the pre-launch session, in which this media participated, set expectations: the complexity of data centers that are supporting the AI ​​revolution has been
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional
Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes.The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.