stealthwatch

April 11, 2017

SECURITY

Lateral Movement “Whack-a-Mole”

Win with Network Monitoring The Cisco Security Incident Response Service team works every day with customers who have either experienced a data breach or have engaged our team to help ensure they are prepared for an incident before it occurs. Our incident responders recently worked with a client whose organization had been targeted with destructive […]

April 3, 2017

SECURITY

Harnessing the Power of NetFlow and Packet Analysis

NetFlow contains network traffic metadata (time, date, IP addresses, port number, etc.). Packet capture retains the packet payload, including user and application information. Together, they allow investigators to be more responsive to threat activity.

March 23, 2017

SECURITY

Payment Processor Secures Global Network with Stealthwatch

Elavon is the fourth-largest payment processing company in the world. They process more than 3 billion transactions annually, worth more than $300 billion. Elavon has more than a million customers and is a leading payment solutions provider for airlines and a top five provider for hospitality, healthcare, and retail. With a globally distributed network that […]

January 23, 2017

SECURITY

What if your network could do it all? Be digital-ready AND secure your business.

Networks today are supposed to be digital-ready, meaning fast and agile to propel business into a world where everything is connected. Getting there has hit some major speedbumps due to highly publicized hacks. And this has started a virtual arms race, where no expense is spared to deploy numerous, disparate security solutions. Yet somehow, the […]

December 19, 2016

SECURITY

To be Effective, Security Needs to Be a Force Multiplier

Effective security is simple, open, and automated.  We’ve already talked about simple and open. Now let’s talk about automated. Security admins can relate to this scenario. You just learned of an infected system in your environment of thousands of devices. How many others are affected? That’s hard to figure out even in elite operations. What […]

December 1, 2016

HEALTHCARE

Protecting Clinical Devices – the Achilles Heel of Healthcare

Everyday, hackers and cybercriminals are infiltrating networks. And they are especially interested in healthcare. That’s because stolen medical records are profitable, selling up to 10 times more than credit card numbers on the black market. But even more lucrative than identity theft is a ransomware attack. Cyber criminals can charge a hospital millions to unlock […]

November 11, 2016

TECHWISETV

Stealthwatch Learning Network License: The Workshop

Get an inside look at how Stealthwatch Learning Network License can transform your branch network router into a powerful security sensor and enforcer: one capable of quickly detecting threat activity and mitigating attacks, with little to no hands-on management needed.

November 3, 2016

TECHWISETV

Integration: The Civilized Approach to Securing Your Branch

We demonstrate two different scenarios: An anomaly that turns out to be an FTP file transfer we didn’t expect, and an unusual spike in traffic. In both cases, what blew me away was how easy it was to understand what was truly going on, and how simple it was to take action.

September 20, 2016

SECURITY

The True Value of Network Security Monitoring

The Enterprise Strategy Group (ESG) conducted research into how cybersecurity professionals view network security monitoring and how they use it in their organization. The report Network Security Monitoring Trends surveyed 200 IT and cybersecurity professionals who have a knowledge of or responsibility for network security monitoring. Some of the key findings include: Many organizations now […]