PTP’s webinar event originally delivered on April 6, 2021 with Cisco and AWS Marketplace. This webinar was led by Chris Dusio of PTP and Crystal Moody of Cisco and discussed the Secure Cloud Analytics solution, its value and how PTP can help our customers put it to work. PTP has published this offer on the AWS Marketplace for delivering a Managed Secure Cloud Analytics (Stealthwatch Cloud) solution to improve security visibility in the cloud for overall data protection.
Click HERE for PTP’s Offer on AWS Marketplace
Click HERE for more on PTP’s Security Services
Organizations have already invested significant resources into IT security infrastructure and, yet threats are finding ways to get through. Even more challenging, the average time to detect a breach is >200 days. Lack of visibility is a function of the growing network complexity as well as the constantly evolving threats. Security teams with their limited resources and disjointed tools can only do so much. We all have security solutions, such as firewalls, but how do we know those are working, managed, and configured properly? How do we know these tools are doing the job that we need them to do?
PTP Managed Secure Cloud Analytics Expert Security Resources:
The PTP team of security industry veterans provides the platform management, optimization, incident triage, threat hunting and intelligent escalation to facilitate event remediation before there is any data loss.
Cisco Secure Cloud Analytics (SCA) ingests and analyzes telemetry from multiple network devices such as routers, switches and firewalls. It also natively collects telemetry from the public cloud infrastructure. SCA uses entity modeling to classify all the devices or entities connected to the network such as servers, printers, etc. to efficiently determine normal behavior of these entities so it can alarm on any anomalies.
Predictive Threat Analysis:
SCA constantly observes network activities to create a baseline of normal behavior, and alarms on any anomalies. It also has knowledge of known bad behavior that it alarms on. SCA uses global threat intelligence to correlate local threats globally, and thwart attackers rinse-and-repeat tactics.
SCA creates alarms that are prioritized by threat severity and have additional information to take actions easily. No need to analyze large amounts of data in order to detect and investigate incidents.