netflow

November 11, 2016

TECHWISETV

Stealthwatch Learning Network License: The Workshop

4 min read

Get an inside look at how Stealthwatch Learning Network License can transform your branch network router into a powerful security sensor and enforcer: one capable of quickly detecting threat activity and mitigating attacks, with little to no hands-on management needed.

July 25, 2016

SECURITY

Protect the Branch with Stealthwatch Learning Network License

4 min read

The threat environment faced by organization deploying branch networks continues to evolve. It’s time for a disruptive approach to handling network security across many distributed branch sites. Automation is becoming a requirement, because the growing volume and complexity of the threats to data security have made it impossible to keep up with them manually. Cisco […]

July 12, 2016

SECURITY

Cisco Stealthwatch Learning Network License for your digital-ready network

2 min read

Activate your Cisco network as a sensor and enforcer for branch-level threat detection and response Return on investment. We often hear this phrase not only in business, but also in life. For example, when choosing home renovation projects, conventional wisdom says that updating a kitchen will yield greater return on investment than creating a guest […]

July 6, 2016

SECURITY

NetFlow AND PCAP (not or)

2 min read

As digital transformation sweeps across the world, there is a driving need for more effective logging and data recording for incident response. In today’s IT world, your agency’s Computer Incident Response Team (CIRT) must have the capability to quickly determine the source and scope of an attack on its network in order to effectively mitigate […]

June 9, 2016

SECURITY

Detection in Depth

2 min read

Defense in depth is a well understood and widely implemented approach that can better secure your organization’s network. It works by placing multiple layers of defense throughout the network to create a series of overlapping and redundant defenses. If one layer fails, there will still be other defenses that remain intact. However, a lesser known […]

May 9, 2016

SECURITY

The Formula One Approach to Security

4 min read

Many of today’s systems are built on telemetry, the automated gathering of remote data measurements to gain insights and manage performance and operations. One industry that has been quick to embrace telemetry is auto racing. Winning racing teams are outfitting their cars with around 100 sensors that monitor thousands of components. Every race weekend, hundreds […]

March 2, 2016

SECURITY

Digitization Compels a Fresh Approach to Network Security

3 min read

We know that organizations today must digitize to thrive, with the CIO and IT teams at the helm of the transformational journey.   Why does this matter?  Because businesses must find ways to deliver more modern business operations as well as satisfying customer and workplace experiences or quickly fall behind their digitized competitors. This digital transformation […]

November 16, 2015

SECURITY

An introduction to the new Cisco Network Visibility Flow Protocol (nvzFlow)

5 min read

As recently announced, Cisco AnyConnect 4.2 extends visibility to the endpoint with the Network Visibility Module (NVM).  Users are one of the most vulnerable parts of any security strategy, with 78% of organizations saying in a recent survey that a malicious or negligent employee had been the cause of a breach.  However, until now, IT Administrators […]