Articles
Five ways to detect early signs of a breach using the network
While organizations would ideally like to do everything they can to block a cybersecurity attack, the reality is that internal and external threats targeting your network can find a way to infiltrate and cause a major breach. So how can you answer questions like – Have we been compromised? What did…
Get in the Security Fast Lane with a Stealthwatch and Encrypted Traffic Analytics Test Drive!
As businesses continue to move towards a more digital future, the threats they face continue to become more complex. As many organizations continue to embrace the benefits of cloud, IoT, and an increasingly mobile workforce, threat actors are taking advantage of these attack vectors to work their wa…
Cisco Stealthwatch Cloud and Google Cloud continue partnership to secure customers
There’s no doubt that cloud adoption has led to accelerated business outcomes. The flexibility of compute and ease of deployment is empowering for developers. But developing applications in the cloud has challenged security teams who are attempting to ensure the same protections in the cloud as on-p…
Cisco is a Representative Vendor in the first ever Gartner 2019 Market Guide for the NTA (Network Traffic Analysis) mark …
According to Gartner1, “Applying behavioral analysis to network traffic is helping enterprises detect suspicious traffic that other security tools are missing.” The case for network traffic analysis to uncover hidden threats You are charged with protecting your organization and have made multiple…
Cisco Stealthwatch Cloud and Microsoft Azure: reliable cloud infrastructure meets comprehensive cloud security
Isn’t it great when the enterprise technology solutions you use to achieve various business outcomes partner and work seamlessly with each other? Cisco and Microsoft have done just that to provide you with a scalable and high-performance cloud infrastructure along with easy and effective cloud secur…
Cisco Stealthwatch product updates – enhanced security analytics, context-aware mitigation, better control, easier man …
We are very excited to announce the new features of Cisco Stealthwatch! With release 7.0, we are introducing significant enhancements for the Stealthwatch administrator and the security analyst to detect and respond to threats faster, and manage the tool more efficiently. Enhanced security analytics…
3 Important Security Analytics Attributes. Hint: Machine Learning is Just One
Yes, with the growth in security vendors claiming to do Artificial Intelligence and Machine Learning, one might think it’s the ultimate answer to keeping organizations secure! It is definitely a rapidly evolving technology with many benefits. But while evaluating a security solution, it’s important…
See and respond in time to those pesky threats that cross the perimeter
If someone were to ask you if your network is secure, can you confidently say ‘yes’? Because that would mean you have a way to know if there’s been an APT (Advanced Persistent Threat) attack, if hackers have managed to steal credentials and gain access, or even if there’s an employee accessing criti…