Articles

June 22, 2021

SECURITY

Complete and continuous remote worker visibility with Network Visibility Module data as a primary telemetry source

5 min read

Cisco Secure Network Analytics delivers complete and continuous remote worker visibility to extend zero-trust to any device globally with AnyConnect Network Visibility Module (NVM) data a primary telemetry source!

May 24, 2021

SECURITY

TrustSec Policy Analytics – Part One: What are policy analytics?

4 min read

Cisco Secure Network Analytics' new TrustSec Analytics reports enable users to visualize group communications, validate policies, streamline policy violation investigations, and accelerate policy adoption efforts

January 4, 2021

SECURITY

Introducing the Cisco Secure Network Analytics Data Store!

4 min read

The Secure Network Analytics (formerly Stealthwatch) Data Store manages data more efficiently, to provide increased ingest capacity, enterprise-class resiliency, long-term retention, and enhanced threat detection capabilities through significantly improved query performance.

September 9, 2020

SECURITY

Introducing Stealthwatch product updates for enhanced network detection and response

3 min read

Stealthwatch Release 7.3.0. offers new methods to automate threat response, SecureX and Threat Response integration enhancements, the introduction of the Stealthwatch Data Store, web UI improvements, and security analytics updates.

June 23, 2020

SECURITY

Why you should consider Stealthwatch to monitor your expanding network

3 min read

As networks expand, Cisco Stealthwatch has been recognized as the leading network security analytics solution due to its scalability, comprehensive visibility, and industry leading Encrypted Traffic Analytics and response capabilities.

November 12, 2019

SECURITY

Finding the malicious needles in your endpoint haystacks

5 min read

Cisco’s new EDR capabilities perform complex queries across all endpoints for forensic information and malware artifacts to simplify and accelerate threat hunting, incident investigations, remediation, and vulnerability and compliance assessments.

  • 1
  • 2