cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
6072
Views
114
Helpful
77
Comments
Alexander Stevenson
Cisco Employee
Cisco Employee

Cisco offers several products that use machine learning to enhance network performance, security, and management.

Here are a few examples:

- Click on the product name (in blue) to learn more -

 

 

ACI

ACI.png


Cisco ACI (Application Centric Infrastructure) is a comprehensive data center networking architecture that leverages ML to:

 

- Automate Network Configurations: Streamline network setup and policy enforcement.

- Analyze Traffic Patterns: Adjust policies dynamically based on traffic and application requirements.

 

 

 

Cisco Catalyst Center

Catalyst.png

Cisco Catalyst Center, formerly known as Cisco DNA (Digital Network Architecture), is a comprehensive network management and command center, which uses ML for:

 

- Network Assurance and Analytics: ML algorithms analyze network telemetry data to provide insights, predict issues, and recommend solutions.

- Automation: Automates routine tasks and network configurations based on learned patterns and behaviors.

- Security: Uses ML for threat detection and mitigation by identifying anomalies in network traffic that may indicate security threats.



 

Cisco Secure Endpoint

Secure-Endpoint.png

Cisco Secure Endpoint, formerly AMP for Endpoints, provides visibility into endpoint activity across the organization, enabling security teams to quickly respond to incidents and mitigate potential risks. It integrates seamlessly with Cisco's broader security ecosystem, enhancing overall threat detection and response capabilities. Secure Endpoint uses ML to:

- Detect Malware: Identify and block malicious software on endpoints.

- Analyze Behavioral Patterns: Recognize unusual activity that may indicate a security threat.

- Respond to Threats: Provide automated responses to detected threats to minimize impact.

 

 

 

Cisco Secure Network Analytics

Secure-Network.png

Cisco Secure Network Analytics, formerly known as Stealthwatch, is a network security analytics and visibility solution that uses ML for:

 

- Threat Detection: Detects and responds to threats by analyzing network traffic patterns.

- Anomaly Detection: ML algorithms identify unusual behaviors that could indicate a security breach or network issue.

- Network Monitoring: Provides comprehensive visibility into network traffic and performance.

 

 

 

Cisco Secure Workload

Secure-Workload.png

Cisco Secure Workload, formerly known as Cisco Tetration, is a data center and cloud workload protection platform that uses ML for:

- Workload Behavior Analysis: Understands and monitors normal behavior of workloads to detect deviations that could indicate a security issue.

- Policy Recommendations: Provides micro-segmentation policy recommendations to improve security based on ML analysis of application dependencies.

- Compliance Monitoring: Uses ML to continuously monitor and ensure compliance with security policies.

 

 

 

Cisco Umbrella

Umbrella.png

Cisco Umbrella is a cloud-delivered security service that uses ML for:

 

- DNS Layer Security: Uses ML to analyze and predict which domains are likely to be malicious and block access to those sites.

- Secure Web Gateway: Uses ML to inspect web traffic and enforce security policies.

- Threat Intelligence: Continuously updates its threat intelligence database using ML to identify and categorize new threats.

 

 

 

Cisco XDR

XDR.png

Cisco XDR (Extended Detection and Response) enhances security operations by unifying security data, detecting sophisticated threats, and automating responses to mitigate potential risks effectively. XDR uses ML to:

- Unify Security Data: Integrate data from multiple sources to provide a comprehensive view of threats.

- Detect Advanced Threats: Identify sophisticated threats that may evade traditional security measures.

- Automate Response: Provide coordinated and automated responses to detected threats.

77 Comments
Mark Healey
Level 1
Level 1

Are there any plans to integrate Splunk into Cisco Secure Network Analytics?

andrecsthompson
Level 1
Level 1

Hello Alexander

Wonderful post.

I have a question: Is the data gathering from my network to your cloud secure?

jmarro1970
Level 1
Level 1

Thank you for sharing

collin-yackel
Level 1
Level 1

Thank you for sharing. Great information!

tbaader
Level 1
Level 1

I am missing SD-WAN as I heard in combination with Thousand Eyes and Analytics predictive measures can be taken to improve UX.
In addition, are there any cross domain integration and automation plans, e.g. Catalyst SD-WAN Manager, Catalyst Center and ACI?

hstoddart
Level 1
Level 1

thank you very much for the information shared

ghanson
Level 1
Level 1

Yes indeed! Thank you for sharing!

Kenneth Canete
Level 1
Level 1

Thanks you for sharing these insightful article. Do they have some overlap with the other products?

rocky.dizon
Level 1
Level 1

Thank for sharing this information!

devnetdexter
Level 1
Level 1

Hey @Alexander Stevenson 

As an automation advocate, which of these platforms have you seen the most automation created with? It feels like DNAC is the obvious choice but I'm curious if you've heard of some interesting things that other customers are doing on the others.

veletur
Level 1
Level 1

This is so beautifully organized, straight to the point descriptions, I liked it  and bookmarked Alexander's blog for myself. Thank you so much!

Amit Gumber
Level 1
Level 1

Excellent approach for automating the environment 

lpersing
Level 1
Level 1

Great insight, thanks for sharing.

vprobish
Level 1
Level 1

Thank you for sharing

DrVavin
Level 1
Level 1

 

To consolidate everything into a single pane of glass, are there any plans to integrate threat intelligence from other sources such as Check Point, Rapid7, Pentera, etc.?

Getting Started

Find answers to your questions by entering keywords or phrases in the Search bar above. New here? Use these resources to familiarize yourself with the community: