How EVE Detects Malicious Uses of Trustworthy Cloud Services
Learn how the Encrypted Visibility Engine (EVE) uses ML/AI to identify encrypted malware communication even when it is destined to trustworthy cloud services.
What are you missing when you don’t enable global threat alerts?
Network telemetry can identify user behaviors, malicious tools installed in enterprise environments, and malware itself. Are you applying a global view to your network? If not, read on to learn more.
Maintain Cloud Security Posture with Cisco Secure Cloud Analytics
At our Partner Summit 2020 event we announced new features being brought into Cisco Secure Cloud Analytics that enable stronger cloud security posture management for our customers.
Get a compliant “Cloud Smart” approach to security with Stealthwatch Cloud
US Public Sector customers can now secure sensitive workloads and meet regulatory standards with Stealthwatch Cloud in AWS GovCloud
Threats in encrypted traffic
There was a time when the web was open. Quite literally—communications taking place on the early web were not masked in any significant fashion. This meant that it was...
To the Depth of TLS Invisibility and Beyond
Encrypted traffic is changing the threat landscape...Encryption technology enables greater privacy and security to communicate and transact business online. Mobile, cloud, and web applications rely on well-implemented encryption mechanisms, using keys and certificates, to ensure confidentiality and trust.
As Encrypted Malicious Web Traffic Increases, Defenders Need Advanced Tools That Provide Visibility
Defenders face two significant challenges in today’s complex threat landscape. First, the number and variety of malware types and families are increasing—so much so that automation of detection and response...