Network Visibility for Mergers and Acquisitions
Mergers and acquisitions bring major challenges to nearly every aspect of a business, but integrating two different networks while maintaining enterprise security is perhaps one of the most demanding trials...
Better design for simpler, more effective security
Few will contest the notion that security is complex. Evolving threats. Clever, motivated attackers. And all too often, vendor-inflicted complexity of managing security from the mismatched consoles from dozens of...
2018 Forrester TEI Study Reveals Stealthwatch + ISE provide 120% ROI
With digital transformation unlocking unprecedented value for today’s businesses and consumers, the key to success is arguably predicated on speed: Whoever is the fastest to enter new markets; the fastest...
Securing Encrypted Traffic on a Global Scale
written by Martin Rehak and Blake Anderson, on behalf of Cognitive and ETA teams Introduction How many engineers does it take to find malware in encrypted traffic? In case of...
Encrypted On-Prem Connections to Public Clouds
Cisco Validated Designs (CVDs) help you select a configuration for redundant encrypted tunnels between Google Cloud Platform (GCP) and the traditional private data center.
Harnessing the Power of Network Meta Data: Finding Malware
Probably not a day goes by without someone telling you about a new vulnerability or threat to your network and your data. These threats are seemingly everywhere. In order to protect against these threats, we use strong passwords and encryption. Unfortunately, our adversaries are getting the same messages as they continue to scoop up our […]
Improving Cybersecurity in Healthcare Part II: Control
The Internet of Things (IoT) is ushering in an exciting digital renaissance that is redefining the traditional models of how healthcare is delivered. With IoT devices such as smart infusion pumps or connected inhalers, healthcare providers can now remotely monitor and adjust care. IoT devices in healthcare, where mobile and wearable devices are increasingly connected […]
How to Quickly Differentiate Between Malicious and Harmless Traffic Using the Cisco Security Packet Analyzer
With the constant news headlines about data theft it is mandatory that organizations understand what data is entering, traversing, and leaving their networks and have the ability to examine that data if necessary for conducting network forensic investigations. Two popular style of attacks that are constantly in the news are data hoarding (Edward Snowden) and […]
Fireproofing your network with software-defined segmentation
We often hear of the many challenges of the industrial revolution, but one of the scourges of this time period that often goes unmentioned was mass fires. To the people of the time, great fires threatened the very viability of industrialization. The number of fires bearing the moniker ‘great’ helps prove this point: The 1835 […]