See Stealthwatch Enterprise in the DevNet Zone at Cisco Live
Learn how to use Stealthwatch Enterprise REST APIs to simplify your host group classification workflow, run rich reports and analytics.
Stealthwatch Enterprise and Cisco Threat Response: Bringing machine-scale analysis to human-scale understanding
Want deep network analysis, to quickly understand the behavior of the threats you face? Read the blog to understand how Cisco Stealthwatch Enterprise integration with Threat Response brings advanced security analytics and accelerates key security operations functions: detection, investigation, and remediation in your SOC.
Cisco Stealthwatch Cloud and Google Cloud continue partnership to secure customers
Cisco Stealthwatch Cloud and Google Cloud have partnered together to provide visibility, threat detection and compliance for customers. Announcing Stealthwatch Cloud support for Packet Mirroring service, in addition to consuming Google Cloud VPC Flow Logs.
The Importance of the Network in Detecting Incidents in Critical Infrastructure
As we saw in my last blog the network plays a key role in defending critical infrastructure and IoT. The devices that we are connecting drive our business, enabling us to make smarter decisions and gain greater efficiency through digitization. But how do we ensure the connected devices are acting as intended?
Threats in encrypted traffic
There was a time when the web was open. Quite literally—communications taking place on the early web were not masked in any significant fashion. This meant that it was...
3 Ways Intent-Based Networking Fulfills Business Intent with Multidomain Integration
With intent-based networking, IT teams can quickly set up appropriate networking policies to support any need, in any domain. Today, Cisco is linking the management of these domains together.
Cisco Encrypted Traffic Analytics: Necessity Driving Ubiquity
Cisco's Encrypted Traffic Analytics (ETA) ensures the privacy of our most important business data and allowing us to detect malware that uses that same privacy to cover its tracks.
Security Analytics and Logging: Supercharging FirePower with Stealthwatch
When we consider network threat detection, most of us immediately think of signature and rule-based intrusion detection and prevention systems (IDPSs). However, it is a little discussed fact that the...
Learn About Stealthwatch in the DevNet Zone at CLUS
Join Kyle in the DevNet Zone at #CLUS on for a hands-on workshop to learn about REST API capabilities in Stealthwatch for visibility and security analytics.