Have an account?

  •   Personalized content
  •   Your products and support

Need an account?

Create an account

Protect your cloud assets and private network

Improve security and incident response across the distributed network, from the office to the public cloud. Detect threats in real time. Reduce false positives. Gain actionable security intelligence to make your security team more efficient. And do it all while lowering costs.

Features and benefits

Automatic configuration and threat detection

Stealthwatch Cloud automatically detects early indicators of compromise. These include insider threat activity, malware, and multistaged attacks. It also identifies policy violations, misconfigured cloud assets, and user error and misuse.

Valuable alerts

Stealthwatch Cloud receives a wide variety of network telemetry and logs. It uses modeling to determine each entity’s role. If an entity shows abnormal behavior or signs of malicious activity, an alert is generated so you can quickly investigate it. Current customers rate 96 percent of Stealthwatch Cloud alerts as "helpful."

Regulatory compliance

You can easily monitor your organization for compliance with industry regulations such as the Payment Card Industry (PCI) standard, the Health Insurance Portability and Accountability Act (HIPAA), and the Federal Information Security Management Act (FISMA).

Easy management and scalability

Stealthwatch Cloud is delivered as software as a service (SaaS), making it easy to try, easy to buy, and simple to use. There is no specialized hardware to purchase, no software agents to deploy, and no special expertise required.

How to deploy Stealthwatch Cloud

Stealthwatch Cloud comes in two primary offerings.

Public Cloud Monitoring

Achieve visibility and threat detection in your Amazon Web Services (AWS), Google Cloud Platform, and Microsoft Azure environments with a cloud-native solution.

Private Network Monitoring

Monitor activity and detect threats in your on-premises network with a cloud-based SaaS solution. There’s no need for expensive equipment or IT resources.

A new approach to AWS security

Dynamic environments such as Amazon Web Services (AWS) need a rethinking of security.

Security for Google Cloud

In as little as 10 minutes, secure your Google Cloud Platform environments.

Join us at AWS Anaheim

Attend this free event to learn how Cisco and Amazon Web Services help simplify, secure, and optimize your cloud.

Stealthwatch Cloud is an AWS Advanced Technology Partner

"This is the best solution I have found for network intrusion detection in the cloud. It doesn't require an agent to run on your AWS instances, and it sees the traffic that doesn't make it past the security group rules. Their alerts are worth looking into, which saves time over other intrusion detection solutions. Stealthwatch Cloud is an important part of our compliance control regime."

 --Blake Blackshear, CTO, Concert Genetics

"Stealthwatch Cloud continues to serve an important security role with respect to Seton Hall’s AWS architecture.” 

--Matt Stevenson, Associate Executive Director--IT Services, Seton Hall University

News and events

TechWiseTV demo

The geeks you can trust show how to identify threats in real time across the private network and public cloud.

Stealthwatch Cloud at Google Next 2018

Jeff Moncrief discusses how Stealthwatch Cloud secures public cloud environments, including Google Cloud Platform. 

The changing face of cloud security

Distinguished Engineer T.K. Keanini discusses the changing dynamics of cloud security at AWS Summit New York 2018.

Cloud Unfiltered, Episode 49

Find out what Stealthwatch Cloud is and how it fits into Cisco’s larger security portfolio.

Related products

Cisco Stealthwatch Enterprise

Get visibility and security intelligence across the extended enterprise with Stealthwatch Enterprise.

Cisco Cloudlock

Secure users, data, and applications in the cloud with Cloudlock, a cloud access security broker.

Cisco Umbrella

Protect users anywhere they go with Umbrella, the first line of defense against threats on the Internet.

Resources

For partners

Are you a Cisco partner?  Log in to see additional resources.

Looking for a solution from a Cisco partner? Connect with our security technical alliance partners.