threat detection

June 3, 2019

DEVELOPER

Learn About Using APIs to Automate Threat Defense and Response

Simplicity is a key tenet of Cisco’s security products and integrated security architecture. See us in the DevNet Zone at #CLUS.

January 9, 2019

SECURITY

Security Vigilance Never Rests: Moving to Active Threat Detection

Not all security analytics tools are created equal. Cisco Stealthwatch collects and analyzes massive volumes of data, providing comprehensive internal visibility and protection to even the largest, most complex networks.

July 24, 2018

SECURITY

Encrypted Botnets and cryptomining spotted at Cisco Live

More than 25,000 attendees visited Cisco Live in Orlando this year. While this large concentration of network and security professionals was learning about our latest innovations, Cisco Security was busy...

March 5, 2018

EXECUTIVE PLATFORM

Workload protection is a full cycle. Tetration uniquely delivers on it all.

With Tetration, Cisco protects application workloads wherever they are deployed, offering full cycle protection for any vendor’s infrastructure in any data center and across any cloud.

November 30, 2017

SECURITY

CMS Brute Force Attacks Are Still a Threat

Brute force attacks have existed long before the Internet. As a cryptanalytic attack, it started being used as an attempt to access encrypted data when there were no other options available. With...

October 26, 2015

SECURITY

Active Threat Analytics: Easing the Burden of Threat Management

In Greek mythology, Sisyphus was a trickster king cursed with the eternal torment of fruitless labor. As punishment for his hubris and wile, Zeus condemned this hapless figure to the unending task of pushing a boulder up a mountain. Once he reached the top, the boulder would fall back down. And he would begin again. […]