stealthwatch

December 1, 2016

HEALTHCARE

Protecting Clinical Devices – the Achilles Heel of Healthcare

Everyday, hackers and cybercriminals are infiltrating networks. And they are especially interested in healthcare. That’s because stolen medical records are profitable, selling up to 10 times more than credit card numbers on the black market. But even more lucrative than identity theft is a ransomware attack. Cyber criminals can charge a hospital millions to unlock […]

November 11, 2016

TECHWISETV

Stealthwatch Learning Network License: The Workshop

Get an inside look at how Stealthwatch Learning Network License can transform your branch network router into a powerful security sensor and enforcer: one capable of quickly detecting threat activity and mitigating attacks, with little to no hands-on management needed.

November 3, 2016

TECHWISETV

Integration: The Civilized Approach to Securing Your Branch

We demonstrate two different scenarios: An anomaly that turns out to be an FTP file transfer we didn’t expect, and an unusual spike in traffic. In both cases, what blew me away was how easy it was to understand what was truly going on, and how simple it was to take action.

September 20, 2016

SECURITY

The True Value of Network Security Monitoring

The Enterprise Strategy Group (ESG) conducted research into how cybersecurity professionals view network security monitoring and how they use it in their organization. The report Network Security Monitoring Trends surveyed 200 IT and cybersecurity professionals who have a knowledge of or responsibility for network security monitoring. Some of the key findings include: Many organizations now […]

August 18, 2016

SECURITY

Using Network Telemetry and Security Analytics to Detect Attacks

The Cisco 2016 Midyear Cybersecurity Report has been released, and just like the Cisco Annual Security Report and many other security reports the news isn’t encouraging. The very first sentence in the midyear report explains that as defenders, we simply aren’t getting the job done: “Attackers currently enjoy unconstrained time to operate.”[1] Attackers understand that […]

August 4, 2016

SECURITY

Seeing Over the Wall: Unified TrustSec-ACI Policy Monitoring with Stealthwatch and ISE v2.1

Visibility has always been a core component of building effective security policy. Starting with the discovery phase of understanding the behavior of the users and assets on a network through...

July 25, 2016

SECURITY

Protect the Branch with Stealthwatch Learning Network License

The threat environment faced by organization deploying branch networks continues to evolve. It’s time for a disruptive approach to handling network security across many distributed branch sites. Automation is becoming a requirement, because the growing volume and complexity of the threats to data security have made it impossible to keep up with them manually. Cisco […]

July 12, 2016

SECURITY

Cisco Stealthwatch Learning Network License for your digital-ready network

Activate your Cisco network as a sensor and enforcer for branch-level threat detection and response Return on investment. We often hear this phrase not only in business, but also in life. For example, when choosing home renovation projects, conventional wisdom says that updating a kitchen will yield greater return on investment than creating a guest […]

July 11, 2016

SECURITY

Effective Security Made Simple

Every day companies are turning to digital to create new customer experiences, new business models and gain greater efficiencies. But all the while, attackers continue to advance. To defend against aggressive adversaries, security must advance to more effective solutions that are simple, automated and open. Why?  Let’s take a look at a scenario that could […]