Cisco Stealthwatch
Cisco Provides Sentara with a Healthy Wireless Network
2 min read
Cisco changes Sentara’s wireless network DNA, by providing top-of-the-line hardware with cutting-edge software!
How to Evolve Media Infrastructure, and Sleep Well at Night
3 min read
New security threats can be unsettling, but with the right security foundation, media companies can gain the visibility and control that they need across their IP and cloud infrastructure.
Who’s Afraid of Modernization?
2 min read
Everybody knows that modernizing legacy systems brings better security along with all of the other improvements in power and efficiency. It seems, however, that despite what everybody knows, a large...
Cisco Announces Intent to Acquire Observable Networks, Inc.
1 min read
Together, Cisco and Observable Networks will extend our Stealthwatch solution into the cloud with highly scalable behavior analytics and comprehensive visibility.
A Steady Drumbeat for Simple, Open and Automated
2 min read
I continue to beat the drum for solutions that are simple, open, and automated because it’s something I’m passionate about and Cisco Security is deeply committed to. It’s the clear path forward to security as a force multiplier – helping you to improve your security posture with your existing resources. In March, I gave a […]
Cisco, Intel speed battlefield decision-making
2 min read
Battlefield decisions have to be lightning quick. Thanks to Cisco and Intel, special operations forces can now have more information at their fingertips for making those judgment calls. At this...
#SHOWMESECURITY: Protect Network Assets with a Security Strategy
1 min read
CCI’s Security Solution Director, Andy Erickson, gives a brief re-cap on the recent NTCA IP Vision event happening in St. Louis, MO. Much of the event’s conversations focused on cybersecurity and taking the next steps towards protecting network assets.
Lateral Movement “Whack-a-Mole”
3 min read
Win with Network Monitoring The Cisco Security Incident Response Service team works every day with customers who have either experienced a data breach or have engaged our team to help ensure they are prepared for an incident before it occurs. Our incident responders recently worked with a client whose organization had been targeted with destructive […]
Harnessing the Power of NetFlow and Packet Analysis
3 min read
NetFlow contains network traffic metadata (time, date, IP addresses, port number, etc.). Packet capture retains the packet payload, including user and application information. Together, they allow investigators to be more responsive to threat activity.