cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
7037
Views
114
Helpful
77
Comments
Alexander Stevenson
Cisco Employee
Cisco Employee

Cisco offers several products that use machine learning to enhance network performance, security, and management.

Here are a few examples:

- Click on the product name (in blue) to learn more -

 

 

ACI

ACI.png


Cisco ACI (Application Centric Infrastructure) is a comprehensive data center networking architecture that leverages ML to:

 

- Automate Network Configurations: Streamline network setup and policy enforcement.

- Analyze Traffic Patterns: Adjust policies dynamically based on traffic and application requirements.

 

 

 

Cisco Catalyst Center

Catalyst.png

Cisco Catalyst Center, formerly known as Cisco DNA (Digital Network Architecture), is a comprehensive network management and command center, which uses ML for:

 

- Network Assurance and Analytics: ML algorithms analyze network telemetry data to provide insights, predict issues, and recommend solutions.

- Automation: Automates routine tasks and network configurations based on learned patterns and behaviors.

- Security: Uses ML for threat detection and mitigation by identifying anomalies in network traffic that may indicate security threats.



 

Cisco Secure Endpoint

Secure-Endpoint.png

Cisco Secure Endpoint, formerly AMP for Endpoints, provides visibility into endpoint activity across the organization, enabling security teams to quickly respond to incidents and mitigate potential risks. It integrates seamlessly with Cisco's broader security ecosystem, enhancing overall threat detection and response capabilities. Secure Endpoint uses ML to:

- Detect Malware: Identify and block malicious software on endpoints.

- Analyze Behavioral Patterns: Recognize unusual activity that may indicate a security threat.

- Respond to Threats: Provide automated responses to detected threats to minimize impact.

 

 

 

Cisco Secure Network Analytics

Secure-Network.png

Cisco Secure Network Analytics, formerly known as Stealthwatch, is a network security analytics and visibility solution that uses ML for:

 

- Threat Detection: Detects and responds to threats by analyzing network traffic patterns.

- Anomaly Detection: ML algorithms identify unusual behaviors that could indicate a security breach or network issue.

- Network Monitoring: Provides comprehensive visibility into network traffic and performance.

 

 

 

Cisco Secure Workload

Secure-Workload.png

Cisco Secure Workload, formerly known as Cisco Tetration, is a data center and cloud workload protection platform that uses ML for:

- Workload Behavior Analysis: Understands and monitors normal behavior of workloads to detect deviations that could indicate a security issue.

- Policy Recommendations: Provides micro-segmentation policy recommendations to improve security based on ML analysis of application dependencies.

- Compliance Monitoring: Uses ML to continuously monitor and ensure compliance with security policies.

 

 

 

Cisco Umbrella

Umbrella.png

Cisco Umbrella is a cloud-delivered security service that uses ML for:

 

- DNS Layer Security: Uses ML to analyze and predict which domains are likely to be malicious and block access to those sites.

- Secure Web Gateway: Uses ML to inspect web traffic and enforce security policies.

- Threat Intelligence: Continuously updates its threat intelligence database using ML to identify and categorize new threats.

 

 

 

Cisco XDR

XDR.png

Cisco XDR (Extended Detection and Response) enhances security operations by unifying security data, detecting sophisticated threats, and automating responses to mitigate potential risks effectively. XDR uses ML to:

- Unify Security Data: Integrate data from multiple sources to provide a comprehensive view of threats.

- Detect Advanced Threats: Identify sophisticated threats that may evade traditional security measures.

- Automate Response: Provide coordinated and automated responses to detected threats.

77 Comments
EdsonVazquez
Level 1
Level 1

thank you very much for sharing your excellent and very complete article.

Anil Patil
Level 8
Level 8

Today when we see this type of progress in AI & ML then in future devices will do more than 60% of work,so in this scenerio where we will see our network engineers currently who are doing these 60% tasks

 

David Cardenas
Level 1
Level 1

Which of this tools do you recoomend for a small business that usually have local traffic but, has a server that manage all the main data? Thanks for the info! 

halfaroc1
Level 1
Level 1

Some of that solutions looks pretty similar.

What do I need to consider to pick up one? Software or hardware?

 

Martin L
VIP
VIP
Thank You for sharing the insightful information!!!
Paulo Thame
Level 1
Level 1

Cisco Secure Network Analytics need's Cisco Secure Endpoint or Workload to run ?

jshupick
Level 7
Level 7

Thank you for sharing!

How much Time and Effort do you have to put into it to get it to "Demo Pretty"?

Thanks for sharing !!!

dennis_farrell
Level 1
Level 1

Which of these solutions would you first try and implement in a customer environment to have the most security impact?

AlvaroA
Level 1
Level 1

Thank you for sharing Cisco DNA, now we will try to implement it in our work!

pcgeek2009
Level 1
Level 1

With mircosegmentation in virtualized environments becoming more popular. Is Cisco working on ways to integrate or enhance these features?

julian.bendix
Level 3
Level 3

Thank you so much for putting in all the efforts and sharing this!! 

Very informative and useful information

mdang1
Level 1
Level 1

How can a non-Cisco, brownfield deployment access more functionality of solutions such as Cisco Catalyst SD-WAN?

amitpalsingh
Level 1
Level 1

is Data Gathering from our network to cloud safe ?

Getting Started

Find answers to your questions by entering keywords or phrases in the Search bar above. New here? Use these resources to familiarize yourself with the community: