Avatar

Andrew Akers

Product Marketing Manager

Security Product Marketing

Andrew Akers is a Product Marketing Manager at Cisco. He is focused on Cisco Stealthwatch Cloud and Cisco Cognitive Threat Analytics, helping customers realize the benefits of the public cloud while maintaining am environment resilient to attacks and security risk. Andrew helps drive the go-to-market strategy, planning and execution, including the development of messaging, materials, and sales training.

Andrew has a BA from the University of North Georgia

Articles

November 16, 2018

SECURITY

Agentless threat detection for Microsoft Azure workloads with Cisco Stealthwatch Cloud

Detecting threats, such as malware, rogue insiders, and credential abuse, within public cloud environments can be a major challenge. Traditionally, organizations have tried to solve this problem by overlaying a patchwork of agents across the cloud surface to detect bad activity. This approach requir…

October 11, 2018

SECURITY

Five Network Security Horror Stories

Network visibility is crucial to running a strong network security practice. Oftentimes when organizations first deploy Cisco Stealthwatch, it uncovers previously unknown risky or suspicious activity on the network. In some cases, it detects an outright breach. With Halloween right around the corner…

July 24, 2018

SECURITY

Encrypted Botnets and cryptomining spotted at Cisco Live

More than 25,000 attendees visited Cisco Live in Orlando this year. While this large concentration of network and security professionals was learning about our latest innovations, Cisco Security was busy catching bad guys! Of course we protect our own show, but this year was special… More than 170 c…

February 7, 2018

SECURITY

Protecting your Public Cloud after Meltdown and Spectre

In early January, researchers unveiled several major security vulnerabilities. Dubbed Meltdown and Spectre, these two vulnerabilities pertained to a hardware flaw in CPUs, including Intel, Qualcomm, and ARM processors. Through a complicated series of exploits targeting “speculative execution,” an op…

January 31, 2018

SECURITY

Network Visibility for Mergers and Acquisitions

Mergers and acquisitions bring major challenges to nearly every aspect of a business, but integrating two different networks while maintaining enterprise security is perhaps one of the most demanding trials an organization can undergo. Every organization has their own security policies, and applying…

December 18, 2017

SECURITY

No One Can Detect Threats in Your Public Cloud Like Cisco

Whether it is misconfigured cloud assets, phishing, or malware, protecting your public cloud workloads from threats is a challenge with expensive consequences. If you have tried to extend your on-premises threat detection solutions in the public cloud, you probably know that they can be hard to mana…

October 25, 2017

SECURITY

Fireproofing your network with software-defined segmentation

We often hear of the many challenges of the industrial revolution, but one of the scourges of this time period that often goes unmentioned was mass fires. To the people of the time, great fires threatened the very viability of industrialization. The number of fires bearing the moniker ‘great’ helps…