• Home
  • News
  • Reviews
  • Digital technology
  • Cloud
  • Data analytics
  • Digital leaders
  • IoT
  • Opinion
  • Events
  • Resources
  • SMB Spotlight
  • Newsletters
  • Sign in
  • Events
    • Follow V3 Events

      Sign up to receive email alerts about our events

      Sign up
  • Resources
    • V3resources 120x194
      Network Security Forensics For GDPR Compliance

      An effective network security forensics strategy can assist an organization in providing key compliance-related details as part of any post-incident GDPR investigation.

      Download
      V3resources 120x194
      10 ways to increase productivity with managed Office 365

      For businesses large and small, relying on a cloud-based collaboration and productivity suite such as Microsoft Office 365 is becoming the norm. Enhancing productivity in your organisation is vital to get ahead in 2017 - and using Office 365 can help, if it's used right...

      Download
      Find resources
      Search by title or subject area
      View all resources
  • SMB Spotlight
  • Sign in
  •  
    •  

      You are currently accessing V3 .co.uk via your Enterprise account.

      Personalise your on site experience

      Download and use the apps

      Access your subscription from outside of the office

      Get relevant news and insight straight to your inbox

      • Sign in
     
      • Newsletters
      • Account details
      • Contact support
      • Sign out
     
  • Follow us
    • RSS
    • Twitter
    • Newsletters
    • Facebook
    • YouTube
  • Register
  • News
  • Reviews
  • Digital technology
  • Cloud
  • Data analytics
  • Digital leaders
  • IoT
  • Opinion
 
  •  

    You are currently accessing V3 .co.uk via your Enterprise account.

    Personalise your on site experience

    Download and use the apps

    Access your subscription from outside of the office

    Get relevant news and insight straight to your inbox

    • Sign in
 
    • Newsletters
    • Account details
    • Contact support
    • Sign out
 
V3.co.uk
  • Security

Cisco launches Hadoop-based security tool to defend networks from cyber attacks

Managed Threat Defense uses Hadoop to apply predictive analytics to network traffic

Digital security padlock red image
  • Daniel Robinson
  • Daniel Robinson
  • @TheDanRobinson
  • 22 April 2014
  • Tweet  
  • Facebook  
  •  
  •  
  • Send to  
0 Comments

Cisco has unveiled a Managed Threat Defense service that utilises an analytics approach based on on-premise Hadoop infrastructure to monitor network traffic. The firm said this will help better protect corporate networks against attacks from malware and intruders trying to steal sensitive data.

The networking giant said that Managed Threat Defense uses Hadoop 2.0 to apply predictive analytics to network traffic in order to create a unique profile of the network and monitor it against up-to-date intelligence from Cisco and other customers, and employs heuristics designed to spot anomalous traffic patterns.

This approach, combined with traditional methods, enables the platform to defend against known intrusions, zero-day attacks and advanced persistent threats, Cisco said.

Writing on the Cisco security blog, the firm's vice president of Security Solutions Bryan Palma said that organisations are struggling with the challenges of a dynamic threat landscape and fragmentation of security solutions, and that the new platform was designed to address these issues.

"You do not have to worry about assessing the best technology options, retaining the right number of security experts, and constantly staying current with the changing threat landscape. Instead, you can partner with a trusted advisor in a simple cost-effective way. Today we are pleased to introduce Cisco Managed Threat Defense Service, which allows the power of a global operation to watch out for you," he said.

Managed Threat Defense is an on-premise solution, composed of hardware, software, and analytics. This includes Cisco Advanced Malware Protection (AMP), Sourcefire FirePOWER, and Cisco Cloud Web Security, as well as Hadoop analytics.

The service is currently available in North America and the Asia Pacific region directly from Cisco or its reseller partners. Cisco had not responded to requests regarding European availability at the time of writing.

The launch of the tool comes on the same day Verizon unveiled its annual threat report, which found that over the last ten years 92 percent of all incidents can be attributed to nine basic attack vectors.

  • Tweet  
  • Facebook  
  •  
  •  
  • Send to  
  • Topics
  • Security
  • Networks
  • Cisco
  • Hadoop
  • malware

V3 Latest

BT plan to close down conventional fixed-line phone network by 2025 and go all-IP
BT plan to close down conventional fixed-line phone network by 2025 and go all-IP

BT wants to make the public switched telephone network history within eight years

  • Communications
  • 20 April 2018
Facebook Login hijacked by hidden web trackers, claim security researchers
Facebook Login hijacked by hidden web trackers, claim security researchers

Personal data being purloined by third parties via Facebook Login API

  • Security
  • 20 April 2018
Apple: we've no plans to merger iOS and MacOS
Apple: we've no plans to merger iOS and MacOS

MacOS and iOS are better off apart, says CEO Tim Cook

  • Desktops
  • 20 April 2018
Oracle: Java SE 8 business users must buy a licence from January next year
Oracle: Java SE 8 business users must buy a licence from January next year

Or they'll no longer be entitled to updates and bug patches

  • Developer
  • 20 April 2018
Back to Top

Most read

Oracle: Java SE 8 business users must buy a licence from January next year
Oracle: Java SE 8 business users must buy a licence from January next year
BT plan to close down conventional fixed-line phone network by 2025 and go all-IP
BT plan to close down conventional fixed-line phone network by 2025 and go all-IP
Avast reveals more information detailing how hackers compromised CCleaner
Avast reveals more information detailing how hackers compromised CCleaner
Facebook Login hijacked by hidden web trackers, claim security researchers
Facebook Login hijacked by hidden web trackers, claim security researchers
AMD Ryzen CPU release dates, specs and price: Second-generation AMD Ryzen desktop CPUs available today
AMD Ryzen CPU release dates, specs and price: Second-generation AMD Ryzen desktop CPUs available today
  • Contact
  • Marketing solutions
  • Enterprise IT Events
  • About
  • Terms & conditions
  • Privacy policy
  • RSS
  • Twitter
  • Newsletters
  • Facebook
  • YouTube

© Incisive Business Media (IP) Limited, Published by Incisive Business Media Limited, New London House, 172 Drury Lane, London WC2B 5QR, registered in England and Wales with company registration numbers 09177174 & 09178013

Digital publisher of the year
Digital publisher of the year 2010, 2013, 2016 & 2017