network visibility
Cisco Identity Services Engine wins…again!
For the fourth time in the last five years, Cisco Identity Services Engine (ISE) was recognized as the top solution in the Trust Awards category for Best NAC Solution at the 2020 SC Awards. The announcement was made on Tuesday, February 25, 2020 during the 24th annual SC Awards gala in San Francisco…
Did you really mean what you said? A Use Case decoder.
This blog is one in a series focusing on aspects of Cisco DNA and intent-based networking. #IntentBasedNetworking Several years ago, I ghostwrote a book chapter for the CEO of an e-commerce company. The gist of the chapter was about the challenge of content management. The challenge, you…
Time for Some Straight Talk Around Network Traffic Analysis
According to research from the Enterprise Strategy Group, 87% of organizations use Network Traffic Analysis (NTA) tools for threat detection and response today, and 43% say that NTA is a “first line of defense” in case of an attack. The increasing IT complexity is one of the main factors in the adop…
Cloudy with a Chance of Extremely High Alert Accuracy
You can tell it’s raining by sticking your head out the door; but what’s the likelihood of it stopping in the next hour? What’s the temperature and relative humidity? Suddenly the need for analytics is apparent. Without it, the chance of getting soaked on any given day would dramatically increase. A…
The Importance of the Network in Detecting Incidents in Critical Infrastructure
As we saw in my last blog, the network plays a key role in defending critical infrastructure and IoT. The devices that we are connecting drive our business, enabling us to make smarter decisions and gain greater efficiency through digitization. But how do we ensure those connected devices are acting…
F5 ACI ServiceCenter App Pushes the Envelope in DC Networking Automation
Introduction In tune with changing technology trends, our data center customers are increasingly adopting a solution-focused approach, instead of a point product one, for managing and monitoring their Data Center operations. This trend is very much pronounced with intent-based networking technologie…
Scaling Visibility and Security within the Operational Technology (OT) Environment
Mid- to large-sized enterprises have for many years built the operational technology (OT) environment like an egg – a hard exterior protected by traditional security elements such as firewalls, IDS/IPS, and malware detection (if you are lucky), but a soft interior leaving critical operational assets…
The big myth about security patch management
“If we had just kept our systems patched, the malware wouldn’t have been a problem.” After every major breach you usually hear those words echoed across news media. You might even pause for a moment and tell yourself that if the victims had just patched their systems, they would have bee…
Encrypted Traffic Analytics Receives “Miercom Performance Verified” Certification
Encryption is becoming an increasingly prevalent aspect of digital communications – even when it comes to malware. A Cisco analysis of more than 400,000 malicious binaries found that about 70 percent had used at least some encryption to evade detection as of October 2017. Decrypting this traffic for…