Demos: Cisco Tetration for Data Center Network Analytics and Security（2017-2018 updates）
Last update: 4.12.2018
Save this post! New videos will continue to be added [ranked: newest to oldest]
Cisco Tetration offers holistic workload protection for multicloud data centers by enabling a zero-trust model using segmentation. This approach allows you to identify security incidents faster, contain lateral movement and reduce your attack surface. Its infrastructure-agnostic approach supports both on-premises and public cloud workloads.
What’s more, it’s rich ecosystem of partners brings you flexibility and choice to help you leverage a full-fledged open APIs, publish-subscribe Kafka messaging system, and ability to run custom apps .
One of the partnering solutions is the perfect match for your data center network analytics needs. Check them out!
Cisco Tetration delivers consistent, automated policy enforcement enabling application segmentation across on-premise, private and public clouds. Using software and hardware sensors, Tetration provides a deep understanding of application dependencies and interactions, increasing reliability and simplifying zero-trust operations.
Learn how you can create a consistent whitelist policy model.
Learn how you can get a solid foundation for successful zero-trust operations, application migration and policy enforcement through deep understanding of application behavior.
Cisco Tetration provides a variety of mechanisms to access information from the platform. You can write your own application on the platform using Python, Scala spark SQL.
See how you can automate policy enforcement enabling application segmentation across virtualized and bare-metal servers on-premise, private and public clouds.
Cisco Tetration provides self-monitoring to cluster components that use big data technology and perform analytics including hardware and software sensors for easier cluster management.
Cisco Tetration hardware and software sensors gather comprehensive analytics points of telemetry. This information is thoroughly analyzed and used to create rich information dashboards and critical data points in quick and easy to navigate charts and formats.
Learn how you can easily deploy whitelist policy to any network controller using JSON, XML or YAML formats.
Search billions of records in less than a second. You can collect data center flow information in real time at line rate, and find details of known issues and aberrant behaviors that could go, otherwise, unnoticed.
Understand your business and data center with detailed business context about the service in the form of tags. You can search telemetry data and defined policies based on tags.
See how you can get consistent network policy across different types of infrastructure – any workload, anywhere.
Get holistic workload protection for multicloud data centers with zero-trust model using segmentation. This approach allows you to identify security incidents faster, contain lateral movement and reduce your attack surface. Its infrastructure-agnostic approach supports both on-premises and public cloud workloads.
This video will go through a full mapping exercise: discovering the end points, understanding how they are communicating, building out the map, and lastly, enforce.
Bring your own data! Get information from other systems through Kafka and store them on Tetration, then leverage capabilities like data platform, user apps, and build you own application on top of them.
|Cisco Tetration: Security Policy Enforcement (2:05)
Joe Onisick explains a recent feature of the Tetration Analytics appliance which is its ability to enforce.
|Demo: Cisco Tetration Analytics and Tufin (6:52)
Learn how you can achieve Compliance and Policy Consistency with Cisco Tetration Analytics and Tufin
|Demo: Cisco Tetration and Infoblox (6:16)
This demo is about compliance and security with Cisco Tetration and Infoblox joint solution.
|Demo: Cisco Tetration and Citrix (3:29)
Learn how you can achieve full data center visibility, analytics and security with this joint solution.
| Demo: Cisco Tetration and Turbonomic (6:44)
Learn how to achieve network-aware workload placement and IT optimization with Cisco Tetration Analytics and Turbonomic.
|Demo: Cisco Tetration and Algosec (6:04)
Business driven security policy management with Cisco Tetration and Algosec.
For more information, visit: www.cisco.com/go/tetration