Avatar

Tom Stitt

Product Marketing Director

Advanced Malware Protection

Tom Stitt is Director of Product Marketing for Cisco’s Advanced Malware Protection Technologies.  Currently he is focused on the use of Cisco’s continuous collection and analysis capabilities to make reasonable incident response accessible to well-meaning, but understaffed security teams.

Tom has over 18 years of experience in the IT infrastructure and security technologies in various product management, marketing and business development roles. Tom started in the IT security over 15 years ago when he was part of the founding team at Internet Security Systems, a pioneer in advanced threat detection.

This passion continues at Cisco where big data analytics are used to gain information superiority by integrating and analyzing information from email & web gateways, networks and endpoints to provide better visibility, decisions and control for more effective and comprehensive security.

Tom holds a M.S.E. from University of Alabama and when not engaged in stopping the latest cyber threats, can be found cycling the beautiful back roads of north Georgia.

Articles

November 1, 2016

SECURITY

Transforming Endpoint Security

4 min read

It’s been said before, but this bears repeating. On average, it takes organizations 100 days1 or more to detect a breach after it occurs. On average. This means attackers often have more than three months to examine an organization’s data and then steal what they want. Clearly, this is not effective. These attacks ultimately target […]

July 9, 2014

SECURITY

A New Model to Protect the Endpoint, Part 3: Automated Advanced Analytics

2 min read

In my final post in this series, I wanted to focus on another powerful innovation made possible by combining a big data architecture and a continuous approach for more effective protection: automated, advanced analytics. Today’s advanced malware compromises environments from an array of attack vectors, takes endless form factors, launches attacks over time, and can […]

July 2, 2014

SECURITY

A New Model to Protect the Endpoint, Part 2: Attack Chain Weaving

2 min read

In my last post, I talked about the need for a paradigm shift from point-in-time detection technologies to a new model that combines a continuous approach with a big data architecture. This new model lets Cisco deliver a range of other innovations that enhance the entire advanced malware protection process across the full attack continuum—before, […]

June 25, 2014

SECURITY

A New Model to Protect the Endpoint, Part 1: Continuous vs. Point-in-Time Security

2 min read

The fundamental security problem that many defenders face is securing their environment in a world of continuous change. IT environments change. Threats change. But today’s threat detection technology doesn’t change. It’s stuck in time, point-in-time to be exact. Sure, detection technologies have evolved. The latest improvements include: executing files in a sandbox for detection and […]