Security
Step-by-Step Setup of ELK for NetFlow Analytics
Contents Intro Java Elasticsearch Logstash Kibana Intro The ELK stack is a set of analytics tools. Its initials represent Elasticsearch, Logstash and Kibana. Elasticsearch is a flexible and powerful open source, distributed, real-time search and analytics engine. Logstash is a…
Endpoint Protection and Least Prevalence
Let’s face it, malware is everywhere now, and it’s here to stay. The statistics are staggering. According to the 2014 Cisco Annual Security Report, “100 percent of the business networks analyzed by Cisco had traffic going to websites that host malware” and 96 percent of the business networks analyze…
OpenSOC: An Open Commitment to Security
According to the Breach Level Index, between July and September of this year, an average of 23 data records were lost or stolen every second – close to two million records every day.1 This data loss will continue as attackers become increasingly sophisticated in their attacks. Given this stark reali…
Working Smarter with Cisco Cloud Web Security
We listen to our customers all the time, and what they have been telling us about cloud security over the past 18 months is intriguing. There was a time when IT security leaders were clearly uncomfortable about the idea of trusting remotely delivered security; discussions about cloud security would…
Minimize Threats from Non-Corporate Mobile Apps
Our customers are continuing to feel the pain of having to increasingly support off-premise mobile devices like smartphones and tablets. The critical need to rapidly onboard these devices to connect to corporate services and applications pretty clearly provides business with a competitive advantage…
Baking Security Into the Cloud
Enterprises, governments, and organizations of all sizes are moving to the cloud in record numbers. The cloud can offer resiliency, but it also introduces new security challenges. Security needs to be baked in from the beginning, across the board. Cisco has invested over $1 billion in people, infras…
Extending control and advanced threat protection for web security
Today the web is a favorite vector for threat actors to launch their attacks. According to the Cisco 2014 Midyear Security Report, More than 90 percent of customer networks observed in the first half of 2014 were identified as having traffic going to websites that host malware. More recently, Talos…
New White Paper from Enterprise Strategy Group on the Evolution of and Need for Secure Network Access
Mention Network Access Control (NAC) to some security or network operations engineers, and they just might grimace. Why? Most people still associate NAC with a set of technologies that were complicated to deploy and implement effectively. Today, however, those nightmare assumptions are far removed…
Cisco Identity Services Engine (ISE) 1.3 and Cisco AnyConnect 4.0 Are Now Available!
Cisco customers, partners, and field have been eagerly awaiting the release of the latest version of the Identity Services Engine and the AnyConnect Secure Mobility Client. Well, the wait is now over! After another highly successful limited availability program, Cisco ISE 1.3 and Cisco AnyConnect 4.…

Why Cisco Security?
Explore our Products & Services

Subscribe to our Blogs
Stay up to date and get the latest blogs from Cisco Security
6