Hands on Encrypted Traffic Analytics
For those who are new to Encrypted Traffic Analytics, Cisco security experts will provide an overview of the solution and walk step-by-step through this analytics pipeline. The journey begins with your own Cisco routers and switches configured to export this new telemetry. Essential data features from these encrypted session are sent to Stealthwatch, a powerful analytics engine that aggregates data from across your digital business. Finally, analytics are performed on the encrypted sessions to rapidly identify malware campaigns, without decryption.
Join us for this hands on demonstration and learn how easy it is to experience the value of Encrypted Traffic Analytics.
Topics to be discussed include:
- An overview of the solution with all the components in the value chain
- Configuration of the telemetry exporters (routers/Switches)
- Configuration of Stealthwatch
- Using Stealthwatch for Cryptographic Compliance
- Using Stealthwatch for Malware Detection without decryption
- The future of network telemetry
Approximate duration: 60 minutes