Orca Security needed a tool to stay ahead of the curve and keep pace with the demands of cybersecurity teams (as well as developers, DevOps, cloud architects, risk governance, and compliance teams) who need to easily and intuitively understand exactly what’s in their cloud environments. Orca wanted teams across the organization, regardless of their skill level, to quickly … [Read more...] about How Orca leverages Search AI to help users gain visibility, achieve compliance, and prioritize risks
Visibility
Announcing Kubernetes 360 Updates for Deeper Visibility into Kubernetes Performance
We’re thrilled to announce new feature updates for Logz.io’s Kubernetes 360 to provide deeper visibility and additional troubleshooting capabilities for your Kubernetes environment. For Kubernetes 360, we’ve added the ability to select a specific deployment with filters and see it across all clusters, a Metrics tab in every resources quickview so you can see behavior over time, … [Read more...] about Announcing Kubernetes 360 Updates for Deeper Visibility into Kubernetes Performance
How to See More, But Respond Less with Enhanced Threat Visibility
The subject of threat visibility is a recurring one in cybersecurity. With an expanding attack surface due to the remote work transformation, cloud and SaaS computing and the proliferation of personal devices, seeing all the threats that are continuously bombarding the company is beyond challenging. This especially rings true for small to medium-sized enterprises with limited … [Read more...] about How to See More, But Respond Less with Enhanced Threat Visibility
Cyber Threat Protection — It All Starts with Visibility
Just as animals use their senses to detect danger, cybersecurity depends on sensors to identify signals in the computing environment that may signal danger. The more highly tuned, diverse and coordinated the senses, the more likely one is to detect important signals that indicate danger. This, however, can be a double-edged sword. Too many signals with too little advanced … [Read more...] about Cyber Threat Protection — It All Starts with Visibility
Extend Threat Visibility With Humio’s Integration With CrowdStrike’s Indicators of Compromise (IOCs)
This blog was originally published Oct. 1, 2021 on humio.com. Humio is a CrowdStrike Company. What is an indicator of compromise (IOC)? An indicator of compromise (IOC) is a piece of digital forensics that suggests that an endpoint or network may have been breached. The ability to monitor for indicators of compromise is critical to a comprehensive cybersecurity strategy, … [Read more...] about Extend Threat Visibility With Humio’s Integration With CrowdStrike’s Indicators of Compromise (IOCs)
Complete and continuous remote worker visibility with Network Visibility Module data as a primary telemetry source
Navigating the new normal Organizations are currently facing new challenges related to monitoring and securing their remote workforces. Many users don’t always use their VPNs while working remotely – this creates gaps in visibility that increase organizational risks. In the past, many organizations viewed these occasional gaps in visibility as negligible risks due to low … [Read more...] about Complete and continuous remote worker visibility with Network Visibility Module data as a primary telemetry source
Introducing continuous remote worker visibility and expanded data collection with Secure Network Analytics Release 7.3.2
We are very excited to announce new Secure Network Analytics features! With release 7.3.2, we have furthered our efforts to extend the zero-trust workplace to anywhere on any device through significant enhancements to Secure Network Analytics’ ability to provide complete and continuous remote worker visibility and have also expanded data collection from integrated Cisco Secure … [Read more...] about Introducing continuous remote worker visibility and expanded data collection with Secure Network Analytics Release 7.3.2
Future Focused: Encryption and Visibility Can Co-Exist
Privacy and security are in constant tension. Hiding internet activity strengthens privacy—but also makes it easier for bad actors to infiltrate the network. In fact, 63% of threats detected by Cisco Stealthwatch in 2019 were in encrypted traffic. The European Union is concerned enough that it drafted a resolution in November 2020 to ban end-to-end encryption, prompting outcry … [Read more...] about Future Focused: Encryption and Visibility Can Co-Exist
ISE 3.0 Dynamic Visibility: Step into zero trust for the workplace
Within our Cisco Identity Service Engine (ISE) 3.0 release, we started talking about dynamic visibility. But what is dynamic visibility, what are the benefits, and why should we care? Maybe we should begin with what it is not. Dynamic visibility is not assuming trust based on location. It is not authenticating or establishing trust, based solely on login credentials or a single … [Read more...] about ISE 3.0 Dynamic Visibility: Step into zero trust for the workplace
Cisco Firewalls and ISE Extend Zero Trust Network Visibility and Control
As the number of remote workers continues to grow worldwide, organizations are diligently seeking to strike the right balance between security and convenience. Employees utilize a wide variety of devices to access company web sites, applications, and data. Some devices are maintained by the company and therefore assumed to be secure, but many devices are provided by employees … [Read more...] about Cisco Firewalls and ISE Extend Zero Trust Network Visibility and Control