Cisco Stealthwatch Cloud

March 18, 2020

SECURITY

SaaS-delivered Encrypted Traffic Analytics with Cisco Stealthwatch Cloud

With encryption becoming the new norm, it's increasingly important for organizations to gain visibility into all traffic across the enterprise. Cisco's intuitive network can help detect hidden security threats, even in encrypted traffic.

February 13, 2020

SECURITY

Cisco and Telenor: Working Together to Protect Infrastructure

For service providers around the world, security is a fundamental and integral part of what they do. Cisco, is on a multi-year journey with Telenor because when Telenor deploys new infrastructures, security must be built into everything they do. One of the first major milestones is the roll-out of Cisco Stealthwatch in all of Telenor´s business units across their telecommunications and IT operations.

December 10, 2019

SECURITY

Cisco Stealthwatch Cloud and Google Cloud continue partnership to secure customers

Cisco Stealthwatch Cloud and Google Cloud have partnered together to provide visibility, threat detection and compliance for customers. Announcing Stealthwatch Cloud support for Packet Mirroring service, in addition to consuming Google Cloud VPC Flow Logs.

October 28, 2019

PARTNER

Partner Security and Partner Success

In 2019, the average cost of a data breach is $3.9M, and businesses are looking to MSPs, as their trusted technology advisor, to protect them from the ever-increasing threat landscape....

October 22, 2019

SECURITY

Hit the Simple Button to Solve Complex Security Problems

This blog speaks about the power of the Cisco Security Analytics and Logging solution, which provides automated breach detection and visibility, combining telemetry from both perimeter and internal network sources.

June 28, 2019

SECURITY

Using Amazon Web Services? Cisco Stealthwatch Cloud has all your security needs covered

Like many consumers of public cloud infrastructure services, organizations that run workloads in Amazon Web Services (AWS) face an array of security challenges that span from traditional threat vectors

June 11, 2019

SECURITY

Your applications are on the move – how do you secure them everywhere?

The applications we need to do business are no longer just residing in a single, physical data center. Sure, there are some applications running in your on-premises data center. But...

June 6, 2019

SECURITY

Security Analytics and Logging: Supercharging FirePower with Stealthwatch

When we consider network threat detection, most of us immediately think of signature and rule-based intrusion detection and prevention systems (IDPSs). However, it is a little discussed fact that the...

April 25, 2019

SECURITY

The New Network as a Sensor

Before we get into this, we need to talk about what the network as a sensor was before it was new. Conceptually, instead of having to install a bunch of...