2018 Forrester TEI Study Reveals Stealthwatch + ISE provide 120% ROI
With digital transformation unlocking unprecedented value for today’s businesses and consumers, the key to success is arguably predicated on speed: Whoever is the fastest to enter new markets; the fastest...
Cyber Security is As Much about People as Technology
Cisco hosted the Southern California Cybercup Challenge in December in Cisco’s Customer Experience Center, and I was lucky to welcome a group of college and high school kids from across...
Three Ways in which Stealthwatch Helps You Get More from Your Network Data
Do you know what the greatest Olympian of all time and Stealthwatch have in common? Both work harder and smarter for unbeatable performance. I recently heard from the one-and-only, Michael Phelps. He said that very early on, he and his coach set very high goals. And he knew that to achieve them, he had to […]
A Guide for Encrypted Traffic Analytics
Learn about Encrypted Traffic Analytics, Cisco’s latest innovation that allows organizations to leverage the network to find threats in encrypted traffic.
How to Evolve Media Infrastructure, and Sleep Well at Night
New security threats can be unsettling, but with the right security foundation, media companies can gain the visibility and control that they need across their IP and cloud infrastructure.
#SHOWMESECURITY: Protect Network Assets with a Security Strategy
CCI’s Security Solution Director, Andy Erickson, gives a brief re-cap on the recent NTCA IP Vision event happening in St. Louis, MO. Much of the event’s conversations focused on cybersecurity and taking the next steps towards protecting network assets.
Lateral Movement “Whack-a-Mole”
Win with Network Monitoring The Cisco Security Incident Response Service team works every day with customers who have either experienced a data breach or have engaged our team to help ensure they are prepared for an incident before it occurs. Our incident responders recently worked with a client whose organization had been targeted with destructive […]
Harnessing the Power of NetFlow and Packet Analysis
NetFlow contains network traffic metadata (time, date, IP addresses, port number, etc.). Packet capture retains the packet payload, including user and application information. Together, they allow investigators to be more responsive to threat activity.