Encrypted Traffic Analytics

December 8, 2017


Catalyst 9000 Switches – CRN’s 2017 Overall Network Product of the Year

We are proud and honored to have the Cisco Catalyst 9000 family of switches recognized as CRNs 2017 Overall Network Product of the Year.

December 6, 2017


Reimagining Customer Value with Artificial Intelligence

Artificial intelligence (AI) can glean and utilize material insights from the data flowing across Cisco networks. As such, how should we think about AI in the context of company transformation?

August 9, 2017


Encrypted Traffic Analytics – Why Should You Care?

Balancing user privacy and security typically requires security teams to either reject encrypted traffic (slowing down business), or allow it through and increasing the risk of a breach. Not anymore.

July 14, 2017


Highlights of Effective Security from Cisco Live Las Vegas

In case you missed it, here are some key takeaways from John Stewart's Chief Security Officere keynote, Cisco Encrypted Threat Analytics, and Cisco IoT Threat Defense.

July 10, 2017


#CiscoChat Podcast: Exploring Encrypted Traffic Analytics

Recorded live from the Cisco Live Las Vegas floor, this episode focuses on security. More specifically, we look at recent developments in encryption and Cisco’s latest security solution, Encrypted Traffic Analytics.

July 10, 2017


Customers Seek Threat Protection Across WAN, Access and Data Center

With WannaCry barely in the rearview mirror, a new generation of threats are proliferating on a global scale at even faster rates.

July 6, 2017


ETA: Why We Strive for Security That Doesn’t Compromise Privacy

Security owns a complex relationship with privacy, one that can work to protect privacy or undermine it. It is often a compromise, one for the other. Enterprises and other organizations regularly balance this relationship when protecting information systems. I am excited about Cisco’s launch of Encrypted Traffic Analytics (ETA), which offers a better balance point […]

June 23, 2017


Detecting Encrypted Malware Traffic (Without Decryption)

Identifying threats within encrypted network traffic poses a unique set of challenges, i.e. monitoring traffic for threats and malware, but how to do so while maintaining the privacy of the user.