Cisco Stealthwatch Cloud

February 13, 2020

SECURITY

Cisco and Telenor: Working Together to Protect Infrastructure

2 min read

For service providers around the world, security is a fundamental and integral part of what they do. Cisco, is on a multi-year journey with Telenor because when Telenor deploys new infrastructures, security must be built into everything they do. One of the first major milestones is the roll-out of Cisco Stealthwatch in all of Telenor´s business units across their telecommunications and IT operations.

December 10, 2019

SECURITY

Cisco Stealthwatch Cloud and Google Cloud continue partnership to secure customers

2 min read

Cisco Stealthwatch Cloud and Google Cloud have partnered together to provide visibility, threat detection and compliance for customers. Announcing Stealthwatch Cloud support for Packet Mirroring service, in addition to consuming Google Cloud VPC Flow Logs.

October 28, 2019

PARTNER

Partner Security and Partner Success

3 min read

In 2019, the average cost of a data breach is $3.9M, and businesses are looking to MSPs, as their trusted technology advisor, to protect them from the ever-increasing threat landscape....

October 22, 2019

SECURITY

Hit the Simple Button to Solve Complex Security Problems

7 min read

This blog speaks about the power of the Cisco Security Analytics and Logging solution, which provides automated breach detection and visibility, combining telemetry from both perimeter and internal network sources.

June 28, 2019

SECURITY

Using Amazon Web Services? Cisco Stealthwatch Cloud has all your security needs covered

2 min read

Like many consumers of public cloud infrastructure services, organizations that run workloads in Amazon Web Services (AWS) face an array of security challenges that span from traditional threat vectors

June 11, 2019

SECURITY

Your applications are on the move – how do you secure them everywhere?

4 min read

The applications we need to do business are no longer just residing in a single, physical data center. Sure, there are some applications running in your on-premises data center. But...

June 6, 2019

SECURITY

Security Analytics and Logging: Supercharging FirePower with Stealthwatch

5 min read

When we consider network threat detection, most of us immediately think of signature and rule-based intrusion detection and prevention systems (IDPSs). However, it is a little discussed fact that the...

April 25, 2019

SECURITY

The New Network as a Sensor

7 min read

Before we get into this, we need to talk about what the network as a sensor was before it was new. Conceptually, instead of having to install a bunch of...

April 24, 2019

GOVERNMENT

Securing Government: It all starts at the DNS Layer

2 min read

One common thread between cyber-attacks is external communication. Malicious communication typically starts, or is exploited, at the DNS layer. Find out how to defend it.