gptkbp:instance_of
|
gptkb:software
|
gptkbp:bfsLayer
|
5
|
gptkbp:bfsParent
|
gptkb:Cisco_Firepower
gptkb:Cisco_security_appliances
gptkb:SD-Access
|
gptkbp:analyzes
|
User behavior
Encrypted traffic
|
gptkbp:can_create
|
Security reports
|
gptkbp:deployment
|
Cloud environments
On-premises infrastructure
|
gptkbp:developed_by
|
gptkb:Cisco_Systems
|
gptkbp:enables
|
Network segmentation
|
gptkbp:enhances
|
Threat intelligence
|
https://www.w3.org/2000/01/rdf-schema#label
|
Cisco Stealthwatch
|
gptkbp:integrates_with
|
gptkb:Cisco_Identity_Services_Engine
SIEM solutions
|
gptkbp:is_available_in
|
On-premises model
Saa S model
|
gptkbp:is_available_on
|
gptkb:Cisco_Secure_X
gptkb:Cisco_App_Dynamics
|
gptkbp:is_compatible_with
|
gptkb:Cisco_Firepower
gptkb:Cisco_Umbrella
Third-party security tools
|
gptkbp:is_designed_for
|
Enterprise networks
|
gptkbp:is_part_of
|
gptkb:Cisco_Secure_Network_Analytics
gptkb:Cisco_Security_portfolio
gptkb:Cisco's_Zero_Trust_strategy
|
gptkbp:is_recognized_by
|
gptkb:External_threats
Insider threats
|
gptkbp:is_scalable
|
Large enterprises
Small businesses
|
gptkbp:is_supported_by
|
Cisco technical support
|
gptkbp:is_used_by
|
Security operations teams
|
gptkbp:is_used_for
|
Risk assessment
Compliance audits
|
gptkbp:is_used_to
|
Improve security posture
|
gptkbp:is_utilized_in
|
Managed security service providers (MSS Ps)
|
gptkbp:monitors
|
Network traffic
|
gptkbp:offers
|
Compliance reporting
Incident response capabilities
Customizable dashboards
Automated response actions
|
gptkbp:provides
|
Forensic analysis
Data visualization
Real-time alerts
Network visibility
Threat hunting capabilities
User and entity behavior analytics (UEBA)
|
gptkbp:recognizes
|
Anomalous behavior
|
gptkbp:supports
|
Threat detection
Multi-cloud environments
Incident investigation
|
gptkbp:uses
|
Machine learning
|
gptkbp:utilizes
|
Flow data
|