Lancope is now part of Cisco Learn MoreLancope Arrow About Cisco
Organizations understand the value of network security monitoring, and more than 90% of CISOs plan to invest in the practice over the next two years...
Detect with Host alarms
Rogue DHCP servers can potentially distribute IP addresses on your network to un-authorized hosts. Security operators can use Stealthwatch to report...
Don’t Stretch SIEM Beyond its Capabilities for Contextual Security Analytics
Many security professionals are familiar with the feeling of constantly putting fires out. Many organizations have an under-staffed and under-funded...
Since the Stealthwatch System was introduced nearly 15 years ago, improvement of the user interface has evolved exponentially to meet the demands of...
Hospitals are responsible for more than the medical wellbeing of their patients. They also house highly sensitive information on patients and...
The network is changing, and the cyber-threat landscape is evolving with it. By 2030, 500 billion devices will be connected to the Internet, and many...
In January, SANS WhatWorks interviewed Erie Insurance to discuss how they achieved comprehensive network visibility, behavioral monitoring, and...
In a typical password brute force attack scenario, an attacker uses either automated tools (along with dictionary files) or manually attempts several...
Insider threats are one of the most difficult threats to detect and effectively combat and are a major concern for government agencies, which are...
Host Groups within Cisco Stealthwatch are a powerful construct that allow logical grouping of IP assets into functional containers. Structuring these...
It’s difficult to understand how influential state and local governments are to the average citizen. In addition to housing critical information on...
The following post contains spoilers for Rogue One: A Star Wars Story. Readers beware. While watching the new Star Wars movie Rogue One at a Cisco...

Pages