security analytics
Agentless threat detection for Microsoft Azure workloads with Cisco Stealthwatch Cloud
Detecting threats, such as malware, rogue insiders, and credential abuse, within public cloud environments can be a major challenge. Traditionally, organizations have tried to solve this problem by overlaying a patchwork of agents across the cloud surface to detect bad activity. This approach requir…
Automated Policy & Segmentation Violation Alerting with Stealthwatch Cloud
Stealthwatch Cloud is best known for network behavioral anomaly detection and entity modeling, but the level network visibility value it provides far exceeds these two capabilities. The underlying traffic dataset provides an incredibly accurate recording for every network conversation that has trans…
Deploying Stealthwatch Cloud in a Google GKE Kubernetes Cluster
Cisco Stealthwatch Cloud has the unique ability to provide an unprecedented level of visibility and security analytic capabilities within a Kubernetes cluster. It really doesn’t matter where the cluster resides, whether on-premise or in any public cloud environment. Stealthwatch Cloud deploys as a d…
Easily detect threats and risks for Google Cloud Platform
According the Cisco 2018 Annual Cybersecurity Report, 40 percent of the dynamic networks, endpoints, and cloud infrastructure in enterprises is leading to significant blind spots and lack of real-time awareness for security teams. In addition, 53 percent of organizations host at least half of their…
Cisco Stealthwatch and Cisco DNA Center bridge the SecOps – NetOps divide
By sheer necessity, there is an increasingly interdependent role between NetOps and SecOps in many enterprises. Cisco has been monitoring three trends: Networks are connecting ever more devices, locations and users. The complexity of managing them is creating openings for new threats. As advanced t…
TLS version 1.3: Change is here and Encrypted Traffic Analytics has got your back
Networks are becoming increasingly opaque via encrypted sessions, greatly benefiting end users because it ensures privacy and authenticity of the connection between applications over networks where we must assume zero trust. The bad news is that threat actors are also benefiting from pervasive encr…
Three Ways in which Stealthwatch Helps You Get More from Your Network Data
Do you know what the greatest Olympian of all time and Stealthwatch have in common? Both work harder and smarter for unbeatable performance. I recently heard from the one-and-only, Michael Phelps. He said that very early on, he and his coach set very high goals. And he knew that to achieve them, he…
Cisco Tetration Accelerates Cisco IT’s Journey toward an App-Centric, Secure Digital Business
Cisco Migrates Thousands of Business-Impacting Apps with Higher Accuracy and Confidence, Saving 70% in Staff Time Recently, Forbes Insights published a survey of hundreds of CIOs about their views on the challenges and the opportunities to migrate to a hybrid IT environment. Not surprisingly perhap…
5 Steps to Zero Trust Data Center with Cisco Tetration Analytics
In a recent cybersecurity study, Gartner reported that data center protection is the foundation of digital business and innovation. With organizations embracing digital business, they need to address the lack of directly owned IT infrastructure and the prevalence of services outside of IT’s c…