The New Network as a Sensor
Before we get into this, we need to talk about what the network as a sensor was before it was new. Conceptually, instead of having to install a bunch of...
DDoS Mitigation for Modern Peering
Learn more about new DDoS attacks and the best way to mitigate them.
Cloud Unfiltered, Episode 49: Sustainable Security Technology, with Patrick Crowley
I am not typically nervous when I go into podcast interviews, but I have to admit that I was more than a little intimidated by the time I’d finished my...
A Guide for Encrypted Traffic Analytics
Learn about Encrypted Traffic Analytics, Cisco’s latest innovation that allows organizations to leverage the network to find threats in encrypted traffic.
Harnessing the Power of NetFlow and Packet Analysis
NetFlow contains network traffic metadata (time, date, IP addresses, port number, etc.). Packet capture retains the packet payload, including user and application information. Together, they allow investigators to be more responsive to threat activity.
Payment Processor Secures Global Network with Stealthwatch
Elavon is the fourth-largest payment processing company in the world. They process more than 3 billion transactions annually, worth more than $300 billion. Elavon has more than a million customers and is a leading payment solutions provider for airlines and a top five provider for hospitality, healthcare, and retail. With a globally distributed network that […]
5 Steps to Zero Trust Data Center with Cisco Tetration Analytics
In a recent cybersecurity study, Gartner reported that data center protection is the foundation of digital business and...
Stealthwatch Learning Network License: The Workshop
Get an inside look at how Stealthwatch Learning Network License can transform your branch network router into a powerful security sensor and enforcer: one capable of quickly detecting threat activity and mitigating attacks, with little to no hands-on management needed.
Protect the Branch with Stealthwatch Learning Network License
The threat environment faced by organization deploying branch networks continues to evolve. It’s time for a disruptive approach to handling network security across many distributed branch sites. Automation is becoming a requirement, because the growing volume and complexity of the threats to data security have made it impossible to keep up with them manually. Cisco […]