Cisco Stealthwatch Cloud
SaaS-delivered Encrypted Traffic Analytics with Cisco Stealthwatch Cloud
We’ve reached an interesting turning point for encrypted traffic. Gartner predicted that 80% of web traffic would be encrypted by 2019. Sure enough, this prediction came true. Last year, the team at Let’s Encrypt, an organization that helps enable encryption for websites, cited that 80% of web traff…
Cisco and Telenor: Working Together to Protect Infrastructure
For service providers around the world, security is a fundamental and integral part of what they do. With operations across Scandinavia and Asia, Telenor is no exception. The company connects 183 million customers, and each one of them expects secure connections. It’s a given. That’s a key reason Te…
Cisco Stealthwatch Cloud and Google Cloud continue partnership to secure customers
There’s no doubt that cloud adoption has led to accelerated business outcomes. The flexibility of compute and ease of deployment is empowering for developers. But developing applications in the cloud has challenged security teams who are attempting to ensure the same protections in the cloud as on-p…
Partner Security and Partner Success
In 2019, the average cost of a data breach is $3.9M, and businesses are looking to MSPs, as their trusted technology advisor, to protect them from the ever-increasing threat landscape. Cybercriminals also have MSPs in their crosshairs. So much so that in October 2018, Homeland Security published Ale…
Hit the Simple Button to Solve Complex Security Problems
The Changing Face of Cyber Security Cyber Security is quite like an onion; it brings tears to your eyes! And we at Cisco have made it our mission to wipe those tears and put a smile back on your face. But the onion analogy does not end there. Good Cyber Defense is architected in layers, much like th…
Using Amazon Web Services? Cisco Stealthwatch Cloud has all your security needs covered
Like many consumers of public cloud infrastructure services, organizations that run workloads in Amazon Web Services (AWS) face an array of security challenges that span from traditional threat vectors to the exploitation of more abstract workloads and entry points into the infrastructure. This week…
Your applications are on the move – how do you secure them everywhere?
The applications we need to do business are no longer just residing in a single, physical data center. Sure, there are some applications running in your on-premises data center. But some are also running in offsite data centers. Or in your private cloud. Or on Amazon Web Services. Many are likely mo…
Security Analytics and Logging: Supercharging FirePower with Stealthwatch
When we consider network threat detection, most of us immediately think of signature and rule-based intrusion detection and prevention systems (IDPSs). However, it is a little discussed fact that the very first intrusion detection systems, built back in the ‘80s, were actually based on anomaly detec…
The New Network as a Sensor
Before we get into this, we need to talk about what the network as a sensor was before it was new. Conceptually, instead of having to install a bunch of sensors to generate telemetry, the network itself (routers, switches, wireless devices, etc.) would deliver the necessary and sufficient telemetry…