Cisco Live Melbourne Case Study: Investigation Into a High Traffic Spike
Learn how Cisco XDR, Splunk, and Firewall were used at Cisco Live Melbourne to rapidly investigate and resolve a malicious traffic spike incident on attendee Wi-Fi.
Learn how Cisco XDR, Splunk, and Firewall were used at Cisco Live Melbourne to rapidly investigate and resolve a malicious traffic spike incident on attendee Wi-Fi.
Learn how Cisco XDR integrates with StealthMole for real-time dark web threat intelligence, enabling SOC teams to rapidly identify and respond to compromised credentials.
SOC teams need more evidence for deep investigations. Learn how Cisco XDR Forensics provides rich, interactive data to trace complex attacks and uncover malicious content.
Cisco Security and Splunk secured the GovWare 2025 network in the Security Operations Centre. Learn about the latest innovations for the SOC of the Future.
At GovWare 2025, the team leveraged Splunk Attack Analyzer's API to connect to Endace.
During GovWare, Cisco XDR detected 39 incidents. The SOC team conducted analysis and response actions, and reported critical incidents to the GovWare NOC.
At GovWare 2025, the SOC team combined ES with Splunk SOAR to fully automate and track the incident response process.
Cisco provided a splash page for GovWare 2025, a click-through captive portal. Learn how the team did it.
Learn about the "SOC in a Box" hardware refresh the team deployed for GovWare 2025.