Have an account?

  •   Personalized content
  •   Your products and support

Need an account?

Create an account

Higher precision, faster investigation

Leverage the latest Cisco networking capabilities to avoid, stop, or mitigate threats faster than ever before. Cisco Digital Network Architecture (Cisco DNA) is the industry’s first network with the ability to find threats in encrypted traffic.

Features and benefits

Enhance visibility

Gain insight into threats in encrypted traffic, without the need for decryption, using network analytics and machine learning.

Promote compliance

Know what is and is not encrypted on your network. Promote compliance with cryptographic protocols.

Shorten time to response

Quickly contain infected devices and users, and secure your network.

Save time and money

Use the network as a foundation for security. Capitalize on existing investments.

What you need to enable Encrypted Traffic Analytics

To use Encrypted Traffic Analytics, you need one of the network devices below and Stealthwatch Enterprise.

Stealthwatch

Get real-time monitoring and visibility into all your network traffic, using context-aware analysis, machine learning, and cloud-based threat detection and analytics.

Catalyst 9000 switches

Our next-generation Catalyst 9300 and Catalyst 9400 access layer switches are designed for security, mobility, IoT, and the cloud, so you can handle threats with built-in end-to-end security.

ISR 1000 Series

Get Internet access, advanced security, and wireless services in one device.

ISR 4000 Series

Prepare your branch site and protect it for the future with the Cisco 4000 Series ISR digital-ready platform.

CSR 1000V Series

Extend your enterprise network to public and private clouds. Offer routing, security, and network management as cloud services with multitenancy.

ASR 1000 Series

Transform your service provider or enterprise network edge for the digital era.

Catalyst 9800 Series wireless controllers

Catalyst 9800 controllers come with built-in security: secure boot, runtime defenses, image signing, integrity verification and hardware authenticity.

For partners

Are you a Cisco partner?  Log in to see additional resources.

Looking for a solution from a Cisco partner? Connect with our partner ecosystem.