Cisco Cloud Security

June 28, 2019

SECURITY

Using Amazon Web Services? Cisco Stealthwatch Cloud has all your security needs covered

Like many consumers of public cloud infrastructure services, organizations that run workloads in Amazon Web Services (AWS) face an array of security challenges that span from traditional threat vectors to the exploitation of more abstract workloads and entry points into the infrastructure. This week…

April 25, 2019

SECURITY

The New Network as a Sensor

Before we get into this, we need to talk about what the network as a sensor was before it was new. Conceptually, instead of having to install a bunch of sensors to generate telemetry, the network itself (routers, switches, wireless devices, etc.) would deliver the necessary and sufficient telemetry…

Cisco is Looking Forward to Seeing You at the Big 5G Event

Building on the tremendous momentum generated at MWC-Barcelona a few months ago, Cisco is the Diamond sponsor for the Big 5G Event May 6-8 in Denver, CO.  This is a great opportunity to learn about the Cisco 5G architecture, how it is being implemented today, and to learn about some new cloud-native…

March 4, 2019

SECURITY

Cisco Stealthwatch becomes the only security analytics product to detect threats across private networks, public clouds, …

You have a bigger, more open, and diverse network than ever before. Whether you want to go all-in on cloud, spread your infrastructure across multiple public clouds, embrace containers and Kubernetes, leverage serverless architectures, or double down on on-premise, Cisco Stealthwatch has you covered…

March 4, 2019

SECURITY

Cisco Stealthwatch Cloud and Microsoft Azure: reliable cloud infrastructure meets comprehensive cloud security

Isn’t it great when the enterprise technology solutions you use to achieve various business outcomes partner and work seamlessly with each other? Cisco and Microsoft have done just that to provide you with a scalable and high-performance cloud infrastructure along with easy and effective cloud secur…

December 13, 2018

SECURITY

How Stealthwatch Cloud protects against the most critical Kubernetes vulnerability to-date, CVE-2018-1002105

The increasing popularity of traditional cloud computing technologies such as server-less, on-demand compute and containerized environments has made technologies like Kubernetes part of our daily vernacular as it relates to running our applications and workloads. Kubernetes solves many of the proble…

November 26, 2018

SECURITY

A new way to think about security in AWS

Amazon Web Services (AWS) provides numerous benefits to customers, allowing companies to be more responsive, available, and cost-efficient. It also provides a number of security capabilities, including strong identity and access management, granular activity logs, and strong policy enforcement. Howe…

September 19, 2018

SECURITY

How Alliances Strengthen Your Cybersecurity Defenses

When we started the Cisco Security Technology Alliance (CSTA) a few years ago, we didn’t envisage it growing into such a large ecosystem of technology spanning the breadth of our Cisco Security portfolio in such a short span of time. But security is most effective when it works as an integrated syst…

April 17, 2018

SECURITY

Send Cryptojacking Packing

Although the cryptocurrency market may have lost ~70% of market cap from a high of $835B, it hasn’t stopped malicious actors, ravenous for the next bull run, from mining cryptocurrency. The birth of cryptocurrency has altered the threat landscape making it easier for malicious actors to get paid and…