Homepage Rankings and Research Companies Channelcast Marketing Matters CRNtv Events WOTC Cisco Partner Summit Digital 2020 Lenovo Tech World Newsroom HPE Zone Masergy Zenith Partner Program Newsroom Dell Technologies Newsroom Fortinet Secure Network Hub Hitachi Vantara Digital Newsroom IBM Newsroom Juniper Newsroom The IoT Integrator Lenovo Channel-First NetApp Data Fabric Intel Tech Provider Zone

5 Things To Know About Cisco's Encrypted Traffic Analytics System

Partners can leverage ETA to help customers understand 'how they can have more efficient security' and will be able to build out a larger practice with larger deal sizes, says Cisco executive Prashanth Shenoy.

1   2   3   ... 6 Next


Traffic Jam

Cisco Systems has made available a new feature and cloud service that the company said can detect malware in encrypted traffic across the company's entire portfolio.

Dubbed Encrypted Traffic Analytics, or ETA, the system uses a combination of data and telemetry to detect threats in encrypted traffic wherever it's coming into the network. To make it happen, the San Jose, Calif., company said it has struck a careful balance between providing security while maintaining privacy.

ETA was introduced last June and became available this week across the Cisco portfolio of routers and switches, including its Catalyst portfolio, which is the cornerstone of the company's ambitious intent-based networking efforts. The only prerequisite is that users sign up for Cisco's StealthWatch security service. From there, the system uses analytics and machine learning to spot suspect traffic.

"It's the industry's only solution that has the capability to find threats in encrypted traffic without need for decryption," said Prashanth Shenoy, Cisco vice president of marketing, enterprise networks, IoT and developer platform. "In two years, 80 percent of traffic will be encrypted. That requires us to look at this in a holistic manner. We need to embed security in every part of the network, classify the traffic in terms of what is normal and what is malicious, and allocate the right personnel to the right threat."

Here are five things to know about the Cisco ETA offering.

1   2   3   ... 6 Next

sponsored resources