A Guide for Encrypted Traffic Analytics
Learn about Encrypted Traffic Analytics, Cisco’s latest innovation that allows organizations to leverage the network to find threats in encrypted traffic.
How to Evolve Media Infrastructure, and Sleep Well at Night
New security threats can be unsettling, but with the right security foundation, media companies can gain the visibility and control that they need across their IP and cloud infrastructure.
#SHOWMESECURITY: Protect Network Assets with a Security Strategy
CCI’s Security Solution Director, Andy Erickson, gives a brief re-cap on the recent NTCA IP Vision event happening in St. Louis, MO. Much of the event’s conversations focused on cybersecurity and taking the next steps towards protecting network assets.
Lateral Movement “Whack-a-Mole”
Win with Network Monitoring The Cisco Security Incident Response Service team works every day with customers who have either experienced a data breach or have engaged our team to help ensure they are prepared for an incident before it occurs. Our incident responders recently worked with a client whose organization had been targeted with destructive […]
Harnessing the Power of NetFlow and Packet Analysis
NetFlow contains network traffic metadata (time, date, IP addresses, port number, etc.). Packet capture retains the packet payload, including user and application information. Together, they allow investigators to be more responsive to threat activity.
Payment Processor Secures Global Network with Stealthwatch
Elavon is the fourth-largest payment processing company in the world. They process more than 3 billion transactions annually, worth more than $300 billion. Elavon has more than a million customers and is a leading payment solutions provider for airlines and a top five provider for hospitality, healthcare, and retail. With a globally distributed network that […]
What if your network could do it all? Be digital-ready AND secure your business.
Networks today are supposed to be digital-ready, meaning fast and agile to propel business into a world where everything is connected. Getting there has hit some major speedbumps due to highly publicized hacks. And this has started a virtual arms race, where no expense is spared to deploy numerous, disparate security solutions. Yet somehow, the […]
To be Effective, Security Needs to Be a Force Multiplier
Effective security is simple, open, and automated. We’ve already talked about simple and open. Now let’s talk about automated. Security admins can relate to this scenario. You just learned of an infected system in your environment of thousands of devices. How many others are affected? That’s hard to figure out even in elite operations. What […]