Automated Policy & Segmentation Violation Alerting with Stealthwatch Cloud

By Jeff Moncrief Stealthwatch Cloud is best known for network behavioral anomaly detection and entity modeling, but the level network visibility value it provides far exceeds these two capabilities. The underlying traffic dataset

Source:: Cisco Security Notice

Automated Policy & Segmentation Violation Alerting with Stealthwatch Cloud

By Jeff Moncrief Stealthwatch Cloud is best known for network behavioral anomaly detection and entity modeling, but the level network visibility value it provides far exceeds these two capabilities. The underlying traffic dataset

Source:: Cisco Security Notice

How Alliances Strengthen Your Cybersecurity Defenses

By Scott Pope Today Cisco is proud to announce 57 new technology integrations and 23 net-new vendor partners joining CSTA across all facets of security.

Source:: Cisco Security Notice

How Alliances Strengthen Your Cybersecurity Defenses

By Scott Pope Today Cisco is proud to announce 57 new technology integrations and 23 net-new vendor partners joining CSTA across all facets of security.

Source:: Cisco Security Notice

Cyber Threat Alliance Releases Cryptomining Whitepaper

By Talos Group Despite the recent devaluation of some cryptocurrencies, illicit cryptocurrency miners remain a lucrative and widespread attack vector in the threat landscape. These miners are easy to deploy, and attackers see

Source:: Cisco Security Notice

Cyber Threat Alliance Releases Cryptomining Whitepaper

By Talos Group Despite the recent devaluation of some cryptocurrencies, illicit cryptocurrency miners remain a lucrative and widespread attack vector in the threat landscape. These miners are easy to deploy, and attackers see

Source:: Cisco Security Notice

Disaster Recovery – haben Sie vorgesorgt?

Disaster Recovery – haben Sie vorgesorgt?

Eine verlässliche Disaster-Recovery-Lösung ist wichtig, um im Falle des Falles die lückenlose Fortführung Ihres Geschäftsbetriebes gewährleisten zu können – 24/7, unterbrechungsfrei und ohne Datenverlust. Der ETERNUS Snapshot Manager (ESM) unseres Partners  Fujitsu ist eine solche Lösung. Er hilft Ihnen, Ihre Daten bestmöglich abzusichern und im Ernstfall eine direkte Notfallwiederherstellung zu starten. Er hilft, Sie vor dem Albtraum aller Anwender und Administratoren zu bewahren: dem Datenverlust, der immer Nerven kostet, oftmals teuer ist und manchmal sogar den wirtschaftlichen Ruin bedeuten kann.

Die Lösung erstellt und katalogisiert  anwendungskonforme, arraybasierte Snapshots der laufenden Fujitsu ETERNUS Speichersysteme. Über alle Anwendungen, Geräte und Betriebssysteme hinweg bietet er dabei einen umfassenden Überblick über die angelegten Daten. In der aktuellsten Version erlaubt der ESM sogar, die Snapshots auf ein zweites ETERNUS Speichersystem zu kopieren.

Lesen Sie hier dazu den Blog-Eintrag unseres Partners Fujitsu.

Threat Grid Cloud updates, summer 2018

By Ben Greenbaum Every month, the Threat Grid development team brings you new features and capabilities in the Threat Grid cloud, and these past summer months were no different.

Source:: Cisco Security Notice

Threat Grid Cloud updates, summer 2018

By Ben Greenbaum Every month, the Threat Grid development team brings you new features and capabilities in the Threat Grid cloud, and these past summer months were no different.

Source:: Cisco Security Notice

Threat Roundup for September 7 to September 14

By Talos Group Today, Talos is publishing a glimpse into the most prevalent threats we’ve observed between September 7 and September 14. As with previous round-ups, this post isn’t meant to be an

Source:: Cisco Security Notice