threat detection

September 25, 2020

SECURITY

Automated response with Cisco Stealthwatch

Stealthwatch’s Response Manager has been moved to the web-based UI and modernized to offer new ways to share and respond to alarms with customizable rules and actions to automate remediation.

September 22, 2020

CUSTOMER EXPERIENCE

Why SOAR Is a Compelling Proposition for Your IT Security

An emerging security operations and incident response approach, called Security Orchestration, Automation, and Response (SOAR), is rapidly gaining traction. In this article, we discuss the current state of SOAR and why it is touted as the future of IT security.

September 9, 2020

SECURITY

Introducing Stealthwatch product updates for enhanced network detection and response

Stealthwatch Release 7.3.0. offers new methods to automate threat response, SecureX and Threat Response integration enhancements, the introduction of the Stealthwatch Data Store, web UI improvements, and security analytics updates.

June 23, 2020

SECURITY

Why you should consider Stealthwatch to monitor your expanding network

As networks expand, Cisco Stealthwatch has been recognized as the leading network security analytics solution due to its scalability, comprehensive visibility, and industry leading Encrypted Traffic Analytics and response capabilities.

June 11, 2020

CUSTOMER EXPERIENCE

6 Essential Elements of Your Managed Detection and Response Lifecycle – Part 1

IT teams are dealing with a sharp increase in employees working remotely, as well as new security threats targeting remote workers. In this blog, we discuss the critical components of an effective managed detection and response strategy supporting both remote workers and organizations.

June 11, 2020

CUSTOMER EXPERIENCE

6 Essential Elements of Your Managed Detection and Response Lifecycle – Part 2

As the remote workforce continues to grow, it’s important organizations adapt their security measures to support new work styles. In this blog, we continue our discussion on the essential elements of an effective managed detection and response strategy, focusing on how use cases can be developed, evaluated, deployed, and enhanced.