Page 100 - CSI - Cisco Security Instroduction - BT
P. 100
See and Act on Threats
ISE
Automated policy
enforcement for
segmentation through SD- Encrypted
Access
Traffic Analytics
Machine learning Spot malware in 99 %
NetFlow with encrypted traffic • Analyze metadata without
enhanced Threat Detection Accuracy*
decrypting traffic flows
111011011000001000111 telemetry at
line rate Stealthwatch • Global-to-local knowledge
100111101001000100001
correlation
0.01 %
• Automate policy and segmentation
across the entire network
False Positives*
Catalyst 9K Switch
*Source : Identifying Encrypted Malware Traffic with
Contextual Flow Data, Oct 2016
Cognitive Analytics
103