Cisco and Telenor: Working Together to Protect Infrastructure
For service providers around the world, security is a fundamental and integral part of what they do. Cisco, is on a multi-year journey with Telenor because when Telenor deploys new infrastructures, security must be built into everything they do. One of the first major milestones is the roll-out of Cisco Stealthwatch in all of Telenor´s business units across their telecommunications and IT operations.
Get in the Security Fast Lane with a Stealthwatch and Encrypted Traffic Analytics Test Drive!
Cisco Stealthwatch provides comprehensive network-wide visibility and security analytics, so you can stay ahead of attackers and expose their locations and behaviors to help you prevent a security event from becoming a full-blown breach. Today, we’re happy to announce that you’ll have the chance to get behind the wheel and give Stealthwatch a live test drive!
See Stealthwatch Enterprise in the DevNet Zone at Cisco Live
Learn how to use Stealthwatch Enterprise REST APIs to simplify your host group classification workflow, run rich reports and analytics.
Stealthwatch Enterprise and Cisco Threat Response: Bringing machine-scale analysis to human-scale understanding
Want deep network analysis, to quickly understand the behavior of the threats you face? Read the blog to understand how Cisco Stealthwatch Enterprise integration with Threat Response brings advanced security analytics and accelerates key security operations functions: detection, investigation, and remediation in your SOC.
Cisco Stealthwatch Cloud and Google Cloud continue partnership to secure customers
Cisco Stealthwatch Cloud and Google Cloud have partnered together to provide visibility, threat detection and compliance for customers. Announcing Stealthwatch Cloud support for Packet Mirroring service, in addition to consuming Google Cloud VPC Flow Logs.
The Importance of the Network in Detecting Incidents in Critical Infrastructure
As we saw in my last blog the network plays a key role in defending critical infrastructure and IoT. The devices that we are connecting drive our business, enabling us to make smarter decisions and gain greater efficiency through digitization. But how do we ensure the connected devices are acting as intended?
Threats in encrypted traffic
There was a time when the web was open. Quite literally—communications taking place on the early web were not masked in any significant fashion. This meant that it was...
3 Ways Intent-Based Networking Fulfills Business Intent with Multidomain Integration
With intent-based networking, IT teams can quickly set up appropriate networking policies to support any need, in any domain. Today, Cisco is linking the management of these domains together.
Cisco Encrypted Traffic Analytics: Necessity Driving Ubiquity
Cisco's Encrypted Traffic Analytics (ETA) ensures the privacy of our most important business data and allowing us to detect malware that uses that same privacy to cover its tracks.