Encrypted Traffic Analytics
Catalyst 9000 Switches – CRN’s 2017 Overall Network Product of the Year
We are proud and honored to have the Cisco Catalyst 9000 family of switches recognized as CRNs 2017 Overall Network Product of the Year.
Reimagining Customer Value with Artificial Intelligence
Artificial intelligence (AI) can glean and utilize material insights from the data flowing across Cisco networks. As such, how should we think about AI in the context of company transformation?
Encrypted Traffic Analytics – Why Should You Care?
Balancing user privacy and security typically requires security teams to either reject encrypted traffic (slowing down business), or allow it through and increasing the risk of a breach. Not anymore.
Highlights of Effective Security from Cisco Live Las Vegas
In case you missed it, here are some key takeaways from John Stewart's Chief Security Officere keynote, Cisco Encrypted Threat Analytics, and Cisco IoT Threat Defense.
#CiscoChat Podcast: Exploring Encrypted Traffic Analytics
Recorded live from the Cisco Live Las Vegas floor, this episode focuses on security. More specifically, we look at recent developments in encryption and Cisco’s latest security solution, Encrypted Traffic Analytics.
Customers Seek Threat Protection Across WAN, Access and Data Center
With WannaCry barely in the rearview mirror, a new generation of threats are proliferating on a global scale at even faster rates.
ETA: Why We Strive for Security That Doesn’t Compromise Privacy
Security owns a complex relationship with privacy, one that can work to protect privacy or undermine it. It is often a compromise, one for the other. Enterprises and other organizations regularly balance this relationship when protecting information systems. I am excited about Cisco’s launch of Encrypted Traffic Analytics (ETA), which offers a better balance point […]
Detecting Encrypted Malware Traffic (Without Decryption)
Identifying threats within encrypted network traffic poses a unique set of challenges, i.e. monitoring traffic for threats and malware, but how to do so while maintaining the privacy of the user.