encrypted traffic
How EVE Detects Malicious Uses of Trustworthy Cloud Services
3 min read
Learn how the Encrypted Visibility Engine (EVE) uses ML/AI to identify encrypted malware communication even when it is destined to trustworthy cloud services.
What are you missing when you don’t enable global threat alerts?
3 min read
Network telemetry can identify user behaviors, malicious tools installed in enterprise environments, and malware itself. Are you applying a global view to your network? If not, read on to learn more.
What a year for Cisco Secure Network Analytics!
2 min read
Cisco Secure Network Analytics received high praise from both Gartner and KuppingerCole this year. Here, we look back on some of the features that set this solution apart from other top competitors.
Maintain Cloud Security Posture with Cisco Secure Cloud Analytics
3 min read
At our Partner Summit 2020 event we announced new features being brought into Cisco Secure Cloud Analytics that enable stronger cloud security posture management for our customers.
Get a compliant “Cloud Smart” approach to security with Stealthwatch Cloud
2 min read
US Public Sector customers can now secure sensitive workloads and meet regulatory standards with Stealthwatch Cloud in AWS GovCloud
A Look Back at the Major Cyber Threats of 2019
4 min read
Use the latest Cisco cybersecurity report to understand the current cyber threat landscape, and test how your organization would perform against these attacks.
Threats in encrypted traffic
5 min read
There was a time when the web was open. Quite literally—communications taking place on the early web were not masked in any significant fashion. This meant that it was...
To the Depth of TLS Invisibility and Beyond
3 min read
Encrypted traffic is changing the threat landscape...Encryption technology enables greater privacy and security to communicate and transact business online. Mobile, cloud, and web applications rely on well-implemented encryption mechanisms, using keys and certificates, to ensure confidentiality and trust.
As Encrypted Malicious Web Traffic Increases, Defenders Need Advanced Tools That Provide Visibility
3 min read
Defenders face two significant challenges in today’s complex threat landscape. First, the number and variety of malware types and families are increasing—so much so that automation of detection and response...
1