Cisco Stealthwatch

February 27, 2018

SP360: SERVICE PROVIDER

Cisco Enables Operators to See Inside the 5G Network to Protect Customer Data

    authored by Andrew Turner, Cisco Cybersecurity Manager Data: the currency of all modern companies. Successful acquisition, secure storage and accurate analysis of data can uniquely position companies for competitive success, and as many examples have shown, failure to secure that data…

January 31, 2018

SECURITY

Network Visibility for Mergers and Acquisitions

Mergers and acquisitions bring major challenges to nearly every aspect of a business, but integrating two different networks while maintaining enterprise security is perhaps one of the most demanding trials an organization can undergo. Every organization has their own security policies, and applying…

January 31, 2018

SECURITY

Better design for simpler, more effective security

Few will contest the notion that security is complex. Evolving threats.  Clever, motivated attackers.   And all too often, vendor-inflicted complexity of managing security from the mismatched consoles from dozens of vendors. In this case, not only must users jump between consoles but the actions tha…

January 30, 2018

SECURITY

2018 Forrester TEI Study Reveals Stealthwatch + ISE provide 120% ROI

With digital transformation unlocking unprecedented value for today’s businesses and consumers, the key to success is arguably predicated on speed: Whoever is the fastest to enter new markets; the fastest to innovate; the fastest to deliver value to consumers can be the difference that separates the…

January 26, 2018

SECURITY

Securing Encrypted Traffic on a Global Scale

written by Martin Rehak and Blake Anderson, on behalf of Cognitive and ETA teams Introduction How many engineers does it take to find malware in encrypted traffic? In case of Cisco, the core of machine learning team that enables Encrypted Traffic Analysis (ETA) is about 50 engineers, security resear…

January 23, 2018

CLOUD

Encrypted On-Prem Connections to Public Clouds

Last time in this space I covered APIGee, a component of the Cisco and Google Hybrid Cloud announcement that enables legacy data stores to be front-ended by a modern, secure API with analytics and monitoring.  But if you have business logic running in the public cloud, how can you securely and relia…

January 3, 2018

SECURITY

Harnessing the Power of Network Meta Data: Finding Malware

Probably not a day goes by without someone telling you about a new vulnerability or threat to your network and your data.  These threats are seemingly everywhere.  In order to protect against these threats, we use strong passwords and encryption.  Unfortunately, our adversaries are getting the same…

November 29, 2017

SECURITY

Improving Cybersecurity in Healthcare Part II: Control

The Internet of Things (IoT) is ushering in an exciting digital renaissance that is redefining the traditional models of how healthcare is delivered. With IoT devices such as smart infusion pumps or connected inhalers, healthcare providers can now remotely monitor and adjust care. IoT devices in hea…

October 25, 2017

SECURITY

How to Quickly Differentiate Between Malicious and Harmless Traffic Using the Cisco Security Packet Analyzer

With the constant news headlines about data theft it is mandatory that organizations understand what data is entering, traversing, and leaving their networks and have the ability to examine that data if necessary for conducting network forensic investigations.  Two popular style of attacks that are…