stealthwatch

April 11, 2017

SECURITY

Lateral Movement “Whack-a-Mole”

Win with Network Monitoring The Cisco Security Incident Response Service team works every day with customers who have either experienced a data breach or have engaged our team to help ensure they are prepared for an incident before it occurs. Our incident responders recently worked with a client who…

April 3, 2017

SECURITY

Harnessing the Power of NetFlow and Packet Analysis

Packet capture has long been used by network operators, but a variety of challenges have limited its effectiveness in security and threat detection. In large networks, packet capture can collect terabytes of packet data, and sifting through that data for evidence of an intrusion can take a long time…

March 23, 2017

SECURITY

Payment Processor Secures Global Network with Stealthwatch

Elavon is the fourth-largest payment processing company in the world. They process more than 3 billion transactions annually, worth more than $300 billion. Elavon has more than a million customers and is a leading payment solutions provider for airlines and a top five provider for hospitality, healt…

January 23, 2017

SECURITY

What if your network could do it all? Be digital-ready AND secure your business.

Networks today are supposed to be digital-ready, meaning fast and agile to propel business into a world where everything is connected. Getting there has hit some major speedbumps due to highly publicized hacks. And this has started a virtual arms race, where no expense is spared to deploy numerous,…

December 19, 2016

SECURITY

To be Effective, Security Needs to Be a Force Multiplier

Effective security is simple, open, and automated.  We’ve already talked about simple and open. Now let’s talk about automated. Security admins can relate to this scenario. You just learned of an infected system in your environment of thousands of devices. How many others are affected? That’s hard t…

December 1, 2016

HEALTHCARE

Protecting Clinical Devices – the Achilles Heel of Healthcare

Everyday, hackers and cybercriminals are infiltrating networks. And they are especially interested in healthcare. That’s because stolen medical records are profitable, selling up to 10 times more than credit card numbers on the black market. But even more lucrative than identity theft is a ransomwar…

November 11, 2016

TECHWISETV

Stealthwatch Learning Network License: The Workshop

As many of you may already know, we do a ‘live workshop’ as a companion to every TechWiseTV episode we release.  These workshops are NOT using video at all..but they do feature a solid hour of demos, explanations and two-way Q&A with some of the best engineers in Cisco. The recent show we did on…

November 3, 2016

TECHWISETV

Integration: The Civilized Approach to Securing Your Branch

Same battle, different day: Our branch offices demand speedy access to the same flexible capabilities as everyone back at corporate—mobility, BYOD, guest Wi-Fi, cloud services—but they don’t have corporate’s expertise or the space to run full security operations. Speed, flexibility, costs, and secur…

September 20, 2016

SECURITY

The True Value of Network Security Monitoring

The Enterprise Strategy Group (ESG) conducted research into how cybersecurity professionals view network security monitoring and how they use it in their organization. The report Network Security Monitoring Trends surveyed 200 IT and cybersecurity professionals who have a knowledge of or responsibil…