{"id":565,"date":"2004-09-21T00:00:00","date_gmt":"2004-09-21T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2004\/09\/21\/cisco-named-one-of-top-three-most-trusted-security-vendors\/"},"modified":"2021-12-30T11:37:41","modified_gmt":"2021-12-30T11:37:41","slug":"cisco-named-one-of-top-three-most-trusted-security-vendors","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2004\/09\/21\/cisco-named-one-of-top-three-most-trusted-security-vendors\/","title":{"rendered":"Cisco Named One Of Top Three Most Trusted Security Vendors"},"content":{"rendered":"<p>Yankee Group surveys name Cisco as among most trusted in two categories: managed security services and security products.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cisco has been ranked as one of the top three most trusted security product vendors and one of the top three most trusted security service providers in two surveys done by the Yankee Group.<\/p>\n<p>The Yankee Group 2004 Managed Security Services Survey found that of 606 enterprises, Symantec, Cisco and VeriSign rank as the three most trusted security service vendors.  In another survey, the Yankee Group 2004 Enterprise Security Services survey, Cisco, Cisco, Symantec, and Network Associates ranked as the three most trusted vendors of security products.<\/p>\n<p>Waterfield also noted that firewalls and antivirus tools are the security products most valued by enterprises.<\/p>\n<p>http:\/\/www.networkingpipeline.com\/showArticle.jhtml?articleID=47900555<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[29],"tags":[],"class_list":["post-565","post","type-post","status-publish","format-standard","hentry","category-news"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/565","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=565"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/565\/revisions"}],"predecessor-version":[{"id":3052,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/565\/revisions\/3052"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=565"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=565"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=565"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}