Articles
Simplifying the policy experience for today’s IT teams
5 min read
Cisco Software Defined Access (SDA) just got better with Common Policy, a unique capability that ensures consistent policy enforcement at all network entry points through cross-domain context exchange.
Simplify and Optimize Networking Experiences for the Hybrid Workforce and Cloud Workloads
5 min read
The Power of Cisco Platforms brings new network intelligence from the Meraki Cloud dashboard and Cisco DNA Center to industry-leading Catalyst Switching and Access Points, radically simplifying operations for hybrid cloud applications and hybrid workplaces.
Continuous Learning at Cisco Leads to Career Advancement, Best-in-Class Networking Solutions
5 min read
Continuous Learning across solutions and full-stack architectures is key to developing secure, innovative network technologies and keeping Cisco engineers growing in their careers.
Transitioning to IPv6 for Simplicity, Efficiency, and Modernization
4 min read
In order to grow network-connected ecosystems of OT/IoT endpoints and support a hybrid workforce, organizations need to transition to IPv6 to take advantage of unlimited IP addresses.
You Can Have It All: SASE and Secure SD-WAN with One SD-Architecture
6 min read
Learn how a flexible combination of SASE (pure cloud) and Secure SD-WAN (hybrid cloud, point of presence, and on-premise) can be applied as needed to fit specific use cases while relying on the same software-defined architecture to implement and manage it all.
Giving SecOps a New Weapon with Security Group Access Control Lists
4 min read
Segmenting networks using Security Group Access Control Lists (SGACL) reduces the threat surface by limiting the reach of attacks in east-west traffic to within segments. By sending the permit and deny logs generated by the SGACLs to SIEM applications, SecOps can analyze and correlate them with indicators of compromise generated by other security appliances.
Identify Endpoints, Enforce Policies, and Stop Threats with Network Segmentation
6 min read
Granular network segmentation is the preferred defensive method to prevent the lateral spread of threats through networks. It is also ideal to enforce policies that restrict access to applications by trusted devices and individuals. Automation for identifying, grouping, and enforcing segmentation policies is key to securing networks of all sizes.
Creating More Agile and Upgradable Networks with a Controller-Based Architecture
5 min read
Controllers bring purposeful intelligence into an Intent-Based Network by acting as intermediaries between human operators specifying intents, and all the switches, routers, and access points that provide the required connectivity.
From Controllers to Multi-Domain: 7 Pillars of Intent-Based Networking
7 min read
Wireless technologies, AI, rich behavioral and telemetry databases, more flexible and economical WAN links, and abundant cloud compute resources are becoming available to address the new reality of increasingly complex networks.
- 1
- 2
1