Ever wanted to sit down and talk with a major Stealthwatch expert… just ask questions and get a “reader’s digest version” of what it is all about? If so you are going to love this video Walk-Through series.
A little while ago, Matt Robertson (Principal Engineer and Stealthwatch Expert) and I put together a “walk-through” style video series for Stealthwatch.
It is now OFFICIALLY live on Cisco.com’s web site. I’m very excited about the series and not just because I have a little cameo appearance. 🙂
Stealthwatch really rocks! And I think that you can see that in the varying examples we go through.
Overview
These videos are for you to get familiar with, and learn a little about, Stealthwatch.
Important Note: The videos do not need to be watched in any particular order. So just go to the Walk-Through series and just click around to whatever “calls to you”. 🙂
The videos are broken down into 4 sections:
- What is Stealthwatch
- How Does it Work?
- How is it Used?
- Stealthwatch Wrap-Up
What is Stealthwatch
2 Videos.
Total Time: 4 minutes 7 seconds
Stealthwatch alk-Through: Introduction (1 min 4 sec)
Vicky Leung shares a quick “peek” into some of the topics walk-through hosts, Matt Robertson and Fish Fishburne, will be covering for you in this Stealthwatch Walk-Through series.
Walk-Through: Stealthwatch Overview (3 min 3 sec)
What can Stealthwatch do for you? This video will give you a high-level overview of how Stealthwatch can give you the critical visibility and knowledge we need in today’s networks.
How Does it Work? (24 min 51 sec)
4 Videos.
Total Time: 24 minutes 51 seconds
- Tour the Stealthwatch Dashboard (2:23) – Camtasia
- Stealthwatch Components (8:17) – Lightboard
- Network Visibility and Discovery with Stealthwatch (7:37) – Intro and then Camtasia
- Stealthwatch: Accelerating and Verifying Network Segmentation (6:34) Lightboard
Tour the Stealthwatch Dashboard (2 min 23 sec)
Dive in with Stealthwatch expert, Matt Robertson, as he gives a quick tour of two screens of your “Network Detective Command Console” that you will love – The Stealthwatch Insight Dashboard and the Host Group Report page for all your inside hosts.
Stealthwatch Components (8 min 17 sec)
The two primary components of the Stealthwatch system are the FC (Flow collector) and the SMC (Stealthwatch Management Console). In this video, Stealthwatch expert, Matt Robertson will dig into these two components in more detail and will also delve into other optional and additional components that can be added to your Stealthwatch system.
Network Visibility and Discovery with Stealthwatch (7 min 37 sec)
Stealthwatch, your “Network Detective Command Center” will give you the ability to truly see what is really going on in your network. Are you really ready for that level of knowledge and visibility into your network? If you are, dive into a brief overview with Fish and then over to Matt for a detailed ride-along and some examples of the level of visibility and discovery you can do in your network with Stealthwatch.
Stealthwatch: Accelerating and Verifying Network Segmentation (6 min 24 sec)
In this video, Stealthwatch expert, Matt Robertson, goes to the lightboard to walk us through how Stealthwatch can help you with your segmentation needs.
How is it Used? (26 mins 2 secs)
4 Videos.
Total Time: 26 minutes 2 seconds
- Threat Detection with Stealthwatch: Known Bad and Policy Violations (7:46) – Intro and then Camtasia
- Threat Detection with Stealthwatch: Anomaly Detection (8:54) – Intro and then Camtasia
- Encrypted Traffic Anayltics (ETA) with Stealthwatch (1:08) – Camtasia
- Accelerating Your Incidence Response with Stealthwatch (8:14) – Intro and then Camtasia
Threat Detection with Stealthwatch: Known Bad and Policy Violations (7 min 46 sec)
With Stealthwatch we will have the visibility of knowing all the hosts and all the conversations going on in our network. Once Stealthwatch has all this knowledge and visibility your Network Detective can leverage behavioral analysis and entity modeling to detect threats that are “known bad” and/or “policy violations”.
In this video, Matt will dive into these varying topics and then bring us to the Stealthwatch Management Console for a personalized ride-along.
Threat Detection with Stealthwatch: Anomaly Detection (8 min 54 sec)
Since, with Stealthwatch, we can see every host and know every conversation, we can then, leveraging behavioral analysis understand what is “normal” in our network. How does this help to detect threats?
In this video, Matt will dive into these varying topics and then bring us to the Stealthwatch Management Console for a threat detection ride-along.
Encrypted Traffic Anayltics (ETA) with Stealthwatch (1 min 8 sec)
So much of traffic is now encrypted. But how can we detect threats without decryption?
In this video Matt talks briefly about how with Stealthwatch and Cisco’s Encrypted Traffic Analytics can do just that.
Accelerating Your Incidence Response with Stealthwatch (8 min 14 sec)
You’ve just been alerted to an IOC in your environment and the board wants to know ASAP – “What did this IOC mean to the business? Have we done everything to protect our exposure to this IOC?”
Join Matt as he talks about, and demonstrates, how Stealthwatch can help you answer those questions and accelerate your Incidence Response.
Stealthwatch Wrap-Up
Stealthwatch Walk-Through Wrap-Up (1 min 3 sec)
Vicky Leung shares a quick review into some of the topics covered in the Stealthwatch walk-through video series and shares with you what you can do to continue your Stealthwatch journey.
Categories: Uncategorized
Leave a Reply