The following is a guest post from Scott Pope, Director, Product Management & Business Development, Security Technical Alliances Ecosystem at Cisco.
You can read the original version of this post on Cisco Blogs.
Splunk’s 9th annual user conference, .conf18, kicks-off next week in Orlando. Cisco will be there in a big way given the depth and breadth of our Splunk integrations, but I wanted to shine a light on an integration that is among the most powerful of all our Splunk integrations—Cisco AnyConnect Network Visibility Module and its associated Splunk app in Splunkbase.
Cisco AnyConnect is best known as Cisco’s VPN client deployed to more than 130 million endpoints. But perhaps the most interesting part of AnyConnect is its Network Visibility Module (NVM).
NVM leverages an existing AnyConnect client footprint to generate insightful endpoint security telemetry. Because AnyConnect operates as a network connection, it sees some unique telemetry, such as unique device ID, device name, process/container names, parent processes, parent processes, privilege changes, source/destination domain and DNS info, network interfaces and more. This enables NVM to produce telemetry that enables detection of data leakage, unapproved applications or SaaS services, security evasion, early malware activity. When you bring that data into Splunk for analysis, you gain serious insight on what your endpoints are doing. And sometimes it can be a little scary.
![]() |
See the power of NVM live at Splunk .conf18 during the famed “Boss of the SOC” capture the flag event and “Splunking the Endpoint IV: A New Hope, a hands on session led by Splunk security guru James Brodsky.
Here are 10 key security questions that NVM telemetry analyzed by Splunk answers:
Okay, that was more than 10. See what I mean? NVM is powerful.
NVM isn’t about file analysis like an anti-malware client. Instead it's about traffic analysis. The two are quite complementary, in fact. If you’re familiar with what Cisco Stealthwatch does for analyzing network traffic patterns, that is essentially what NVM does for endpoints. In fact, like Stealthwatch, NVM is based on IPFIX data (i.e. standardized Netflow). NVM generates IPFIX data based on traffic flows and endpoint configuration data. That data is aggregated in Splunk for analysis.
Want to get deeper on NVM? Check out a 5-minute NVM video demo. Want to try it out in your Splunk environment? Check out the NVM Deployment Guide for Splunk and download the NVM app for Splunk from Splunkbase. While NVM requires an Apex AnyConnect license, you can test it out on a limited number of clients with any AnyConnect license.
Learn more about the value of combining Splunk and Cisco technologies in the below sessions or stop by the Cisco booth. See you at .conf!
Tuesday, Oct. 2 3:30-4:15pm | SECS2100: From Endpoint to Firewall – Building Effective Threat Perimeters with Cisco and Splunk |
Tuesday, Oct. 2 4:30-4:50pm | ITS2102: Optimizing and Securing your Data Center by Integrating Cisco ACI, Network Assurance Engine, and Tetration with Splunk |
Wednesday, Oct 3 12:45-1:30pm | SEC1835: Enabling Your Mission Through Automated Alignment With NIST’s Risk Management Framework |
Wednesday, Oct 3 3:15-5:15pm | SEC1378: Splunking the Endpoint IV: A New Hope |
Wednesday, Oct 3 4:30-5:15pm | IT1548: IT Services Modernization at Cisco: How Cisco Monitors 3 Million Devices Daily with Splunk |
![]() |
Scott Pope
Director, Product Management & Business Development
Security Technical Alliances Ecosystem
Scott Pope has held positions in network engineering, market strategy and technical product management at global service providers and networking equipment vendors covering a wide range of data and voice networking technologies. Since 1998 Scott has driven product strategy for many aspects of network security ranging from VPN and firewall to threat management for both wired and wireless networks. Scott currently concentrates his efforts on the Cisco Security technology partner ecosystem, as well other industry partnerships across the Cisco security portfolio.
Follow all the conversations coming out of #splunkconf18!
The world’s leading organizations rely on Splunk, a Cisco company, to continuously strengthen digital resilience with our unified security and observability platform, powered by industry-leading AI.
Our customers trust Splunk’s award-winning security and observability solutions to secure and improve the reliability of their complex digital environments, at any scale.