Avatar

TK Keanini

Principal Engineer

Lancope Engineering

TK brings nearly 25 years of network and security experience to Cisco. With a penchant for driving technical innovation, he is responsible for integrating security solutions with private and public cloud-based computing platforms.

Articles

April 2, 2018

SECURITY

Encrypted Traffic Analytics Receives “Miercom Performance Verified” Certification

Encryption is becoming an increasingly prevalent aspect of digital communications – even when it comes to malware. A Cisco analysis of more than 400,000 malicious binaries found that about 70 percent had used at least some encryption to evade detection as of October 2017. Decrypting this traffic for…

March 22, 2018

SECURITY

Serverless Security for Public Cloud Workloads with Stealthwatch Cloud

[This post was created with contributions from Bo Bayles and Patrick Crowley.] Each year goes by and we find more ways to own less and less of what it takes to operate our digital infrastructure. Information Technology began as a business having to build data centers owning everything starting with…

October 17, 2017

SECURITY

Three Ways in which Stealthwatch Helps You Get More from Your Network Data

Do you know what the greatest Olympian of all time and Stealthwatch have in common? Both work harder and smarter for unbeatable performance. I recently heard from the one-and-only, Michael Phelps. He said that very early on, he and his coach set very high goals. And he knew that to achieve them, he…

June 22, 2017

SECURITY

What is the Body Language of Your Encrypted Network Traffic Really Saying?

Imagine this scenario – you walk into a meeting room with a colleague and they are sitting at the table with their arms crossed. You immediately think to yourself, this meeting is not going to go well, this person is already displeased with me and I have not said anything yet. However, you are makin…

September 20, 2016

SECURITY

The True Value of Network Security Monitoring

The Enterprise Strategy Group (ESG) conducted research into how cybersecurity professionals view network security monitoring and how they use it in their organization. The report Network Security Monitoring Trends surveyed 200 IT and cybersecurity professionals who have a knowledge of or responsibil…

May 9, 2016

SECURITY

The Formula One Approach to Security

Many of today’s systems are built on telemetry, the automated gathering of remote data measurements to gain insights and manage performance and operations. One industry that has been quick to embrace telemetry is auto racing. Winning racing teams are outfitting their cars with around 100 sensors tha…