Encrypted Traffic Analytics
Catalyst 9000 Switches – CRN’s 2017 Overall Network Product of the Year
We are proud and honored to have the Cisco Catalyst 9000 family of switches recognized as CRNs 2017 Overall Network Product of the Year. Every year CRN awards “Product of the Year” for a variety IT-related technology categories specifically looking for products that solve important problems for cust…
Reimagining Customer Value with Artificial Intelligence
Here are a few lesser-known data points about Cisco: More than 600 billion emails originate on Cisco-based networks every day About 2/3 of the world’s Internet traffic runs on Cisco Over 20 billion security breaches are thwarted every day by Cisco From this vast amount of data flowing across Cisco…
A Guide for Encrypted Traffic Analytics
By now, you’ve heard of Encrypted Traffic Analytics, Cisco’s latest innovation that allows organizations to leverage the network to find threats in encrypted traffic. Wondering why this is big news? Consider these statistics (Gartner and NSS Labs): … 63 million new devices are attaching to enterpris…
Encrypted Traffic Analytics – Why Should You Care?
I was recently introduced to Dave McGrew – Cisco’s version of Yoda! This unassuming, humble engineer looks like a geography teacher and is the kind of guy who creates encryption algorithms in his spare time as a hobby – just like we might do crosswords (OK, I don’t do crosswords but you get my poin…
Highlights of Effective Security from Cisco Live Las Vegas
I’m still excited after Cisco Live Las Vegas. Cisco Security was everywhere. Our partners were enthused, our customers were engaged, and I couldn’t be more proud of our team and how we continue to deliver simpler, more effective security. I love Cisco Live. This event is unlike any other gathering a…
#CiscoChat Podcast: Exploring Encrypted Traffic Analytics
Welcome to the third installment of the new #CiscoChat podcast. This episode, recorded live from the Cisco Live Las Vegas floor, focuses on security — and more specifically, on encryption. Aside from detailing recent developments in this rapidly developing field, it also offers a glimpse into Cisco’…
Customers Seek Threat Protection Across WAN, Access and Data Center
Many of you are familiar with the WannaCry ransomware attack that struck businesses in over 150 countries worldwide in May 2017. Targets of the attack included huge corporations and organizations in the UK and U.S. in sectors as diverse as healthcare, telecommunications, logistics, manufacturing an…
ETA: Why We Strive for Security That Doesn’t Compromise Privacy
Security owns a complex relationship with privacy, one that can work to protect privacy or undermine it. It is often a compromise, one for the other. Enterprises and other organizations regularly balance this relationship when protecting information systems. I am excited about Cisco’s launch of Encr…
Detecting Encrypted Malware Traffic (Without Decryption)
Introduction Over the past 2 years, we have been systematically collecting and analyzing malware-generated packet captures. During this time, we have observed a steady increase in the percentage of malware samples using TLS-based encryption to evade detection. In August 2015, 2.21% of the malware sa…
5