encryption
The Impact on Network Security Through Encrypted Protocols – QUIC
QUIC stands for Quick UDP Internet Connections, an experimental protocol designed and deployed by Google.
A Guide for Encrypted Traffic Analytics
Learn about Encrypted Traffic Analytics, Cisco’s latest innovation that allows organizations to leverage the network to find threats in encrypted traffic.
Who’s Afraid of Modernization?
Everybody knows that modernizing legacy systems brings better security along with all of the other improvements in power and efficiency. It seems, however, that despite what everybody knows, a large...
Prevent an Encryption Bottleneck on High-Speed Links
Common encryption security protocols can slow down high-speed network links, but there is an alternative that lets them fly.
Collaboration at #CLUS, Final Wrap: “Ahh, the Cloud” and Endangered Chickens
The final day of Cisco Live US didn’t disappoint. The week closed with a full agenda of sessions, innovation talks, and – of course – the celebrity keynote. Collaboration VP and CTO Jonathan Rosenberg made a room full of people nervous – on purpose. The session title probably provided a clue: “Worried About Putting Your Data in the Cloud? Good, You Should Be.” Speaking of nervous people, Bryan Cranston's celebrity keynote had a strange (and hilarious) focus on the fate of farmyard chickens.
Detecting Encrypted Malware Traffic (Without Decryption)
Identifying threats within encrypted network traffic poses a unique set of challenges, i.e. monitoring traffic for threats and malware, but how to do so while maintaining the privacy of the user.
What is the Body Language of Your Encrypted Network Traffic Really Saying?
The rise of encrypted traffic is changing the threat landscape; the increase in digital business has increased the number of services using encrypted traffic to secure information.
From DRM technology to a working content protection system
When it comes to over-the-top (OTT) video distribution, we are seeing many of our customers opt for a multi-DRM approach. This means utilizing the DRM client that is pre-integrated into the viewing platform instead of installing a DRM. These natively available DRMs – the native DRMs – are developed and deployed by Microsoft, Google and Apple […]
Cisco Successfully Demonstrated Secure Mobile Device at Trident Spectre 2016
Last month Cisco was thrilled to participate in the Department of Defense (DoD) Trident Spectre 2016 annual exercise conducted at Joint Expeditionary Base Little Creek-Fort Story, VA. Trident Spectre is an annual event for special operations, intelligence, interagency, and law-enforcement personnel to test and evaluate emerging technologies both from government and commercial industries in tactically-focused […]
5