netflow
The New Network as a Sensor
Before we get into this, we need to talk about what the network as a sensor was before it was new. Conceptually, instead of having to install a bunch of sensors to generate telemetry, the network itself (routers, switches, wireless devices, etc.) would deliver the necessary and sufficient telemetry…
DDoS Mitigation for Modern Peering
DDoS understandably makes for a lot of headlines and is the source of genuine concern on the modern Internet. For example, the recent memcached attacks were remarkable for the volume of traffic generated through amplification (1.7Tbps) and are the latest reminder that a well-designed network edge ne…
Cloud Unfiltered, Episode 49: Sustainable Security Technology, with Patrick Crowley
I am not typically nervous when I go into podcast interviews, but I have to admit that I was more than a little intimidated by the time I’d finished my research on Patrick Crowley. It wasn’t just that he is the Stealthwatch Cloud CTO. I mean, I suppose that alone is intimidating on its face, but we…
A Guide for Encrypted Traffic Analytics
By now, you’ve heard of Encrypted Traffic Analytics, Cisco’s latest innovation that allows organizations to leverage the network to find threats in encrypted traffic. Wondering why this is big news? Consider these statistics (Gartner and NSS Labs): … 63 million new devices are attaching to enterpris…
Harnessing the Power of NetFlow and Packet Analysis
Packet capture has long been used by network operators, but a variety of challenges have limited its effectiveness in security and threat detection. In large networks, packet capture can collect terabytes of packet data, and sifting through that data for evidence of an intrusion can take a long time…
Payment Processor Secures Global Network with Stealthwatch
Elavon is the fourth-largest payment processing company in the world. They process more than 3 billion transactions annually, worth more than $300 billion. Elavon has more than a million customers and is a leading payment solutions provider for airlines and a top five provider for hospitality, healt…
5 Steps to Zero Trust Data Center with Cisco Tetration Analytics
In a recent cybersecurity study, Gartner reported that data center protection is the foundation of digital business and innovation. With organizations embracing digital business, they need to address the lack of directly owned IT infrastructure and the prevalence of services outside of IT’s c…
Stealthwatch Learning Network License: The Workshop
As many of you may already know, we do a ‘live workshop’ as a companion to every TechWiseTV episode we release. These workshops are NOT using video at all..but they do feature a solid hour of demos, explanations and two-way Q&A with some of the best engineers in Cisco. The recent show we did on…
Protect the Branch with Stealthwatch Learning Network License
The threat environment faced by organization deploying branch networks continues to evolve. It’s time for a disruptive approach to handling network security across many distributed branch sites. Automation is becoming a requirement, because the growing volume and complexity of the threats to data se…