security

December 2, 2014

SECURITY

Step-by-Step Setup of ELK for NetFlow Analytics

10 min read

Contents   Intro Java Elasticsearch Logstash Kibana   Intro   The ELK stack is a set of analytics tools. Its initials represent Elasticsearch, Logstash and Kibana. Elasticsearch is a flexible and powerful open source, distributed, real-time search and analytics engine. Logstash is a tool for receiving, processing and outputting logs, like system logs, webserver logs, […]

November 21, 2014

EXECUTIVE PLATFORM

Creating a More Secure Internet

1 min read

Trust is a fundamental requirement for people to use the Internet with confidence, and Cisco continues to find opportunities to make the Internet even more secure. I am happy to share that we are a founding sponsor of a new public benefit consortium called the Internet Security Research Group (ISRG). The goal of the ISRG […]

November 19, 2014

SECURITY

Endpoint Protection and Least Prevalence

2 min read

Let’s face it, malware is everywhere now, and it’s here to stay. The statistics are staggering. According to the 2014 Cisco Annual Security Report, “100 percent of the business networks analyzed by Cisco had traffic going to websites that host malware” and 96 percent of the business networks analyzed had connections to known hijacked infrastructure […]

November 14, 2014

SECURITY

Minimize Threats from Non-Corporate Mobile Apps

2 min read

Our customers are continuing to feel the pain of having to increasingly support off-premise mobile devices like smartphones and tablets. The critical need to rapidly onboard these devices to connect to corporate services and applications pretty clearly provides business with a  competitive advantage (Cisco Enterprise Mobility Landscape Wave II Study – April 2014) in improving […]

October 29, 2014

SECURITY

The Value of Endpoint and Network Protection Together

2 min read

As I’ve discussed in past blog posts, advanced malware and sophisticated attacks are relentless as they compromise environments using new and stealthy techniques. Modern malware is dynamic and exists in an interconnected ecosystem that is constantly in motion. It will use an array of attack vectors, take endless form factors, and launch attacks over time. […]

October 28, 2014

SECURITY

File Security With the Click of a Button

3 min read

Securing our digital lives used to be simpler. Up until a few years ago, we primarily used email as a means for transferring or exchanging files between two parties. A handful of companies emerged to provide email encryption for those who needed it. Most other people did not worry about it. Today, file exchange has […]

October 27, 2014

SECURITY

Can the Elephant Dance to a Security Tune?

2 min read

There is a great debate in the security world right now: have SIEM and logging products run their course? Will Hadoop ride to the rescue? Can machines “learn” about security and reliably spot threats that no other approach can find? Gartner calls this phenomenon Big Data Security Analytics, and they make a strong point to […]

October 24, 2014

SP360: SERVICE PROVIDER

The New Face in CyberSecurity

1 min read

The demand for CyberSecurity professionals began to overtake the supply of talent 4-5 years ago. The estimated world-wide shortage is one million skilled security professionals. The sophistication and growth in number cyber attacks have outpaced the industries’ ability to respond in a timely manner. With the Internet of Everything and cloud computing, CyberSecurity must be […]

October 22, 2014

SECURITY

Endpoint Visibility is Key to Combatting Attacks

2 min read

As an IT security practitioner, you have a lot on your plate. Malware attacks are ever present. Hackers are smarter than ever and have the resources and persistence to compromise your organization. The malware being created today is more sophisticated. And the number and types of devices being used in the workplace are expanding, which […]