Articles
Relevant and Extended Detection with SecureX, Part Four: Secure Cloud Analytics Detections
5 min read
Building upon the concept of a behaviour-based detections, this piece discusses detections from Cisco Secure Cloud Analytics, when & how to promote them to SecureX as incidents, and how to leverage and extend the detections in SecureX.
Relevant and Extended Detection with SecureX, Part Three: Behaviour-Based Detections with Secure Network Analytics
5 min read
Discover how to leverage Secure Network Analytics to deploy Behaviour-Based Detections, making them more relevant and actionable with Cisco SecureX.
Relevant and Extended Detection with SecureX, Part Two: Endpoint Detections
6 min read
Discover how to automatically extend Cisco Secure Endpoint detections, making them more relevant and actionable with Cisco SecureX.
Relevant and Extended Detection with SecureX
5 min read
Extend your detections: incident prioritization with Cisco SecureX.
TrustSec Policy Analytics – Part Three: Policy Validation
5 min read
TrustSec Policy Analytics – Part Three delves deeper into how users can validate policies and accelerate group-based policy adoption through policy visualization with Cisco Secure Network Analytics’ new TrustSec Analytics reports.
TrustSec Policy Analytics – Part Two: Policy Visualization
5 min read
TrustSec Policy Analytics – Part Two delves deeper into how users can validate policies and accelerate group-based policy adoption through policy visualization with Cisco Secure Network Analytics’ new TrustSec Analytics reports.
Cisco Security at Work: Threatwall at Mobile World Congress 2019
3 min read
The Threatwall is a live display of threats on open conference wireless networks wherever it is deployed, such as Cisco Live or WMC, providing valuable insights on network traffic trends.
Three ways to detect cryptomining activities using network security analytics
4 min read
Looking back at 2018, malicious cryptomining emerged as one of the most prominent threats. As described in-depth in this blog, cryptocurrency mining, or cryptomining for short, is the process...
Seeing Over the Wall: Unified TrustSec-ACI Policy Monitoring with Stealthwatch and ISE v2.1
2 min read
Visibility has always been a core component of building effective security policy. Starting with the discovery phase of understanding the behavior of the users and assets on a network through...