Last updated 4.10.2019
Bookmark this blog! New videos will be added in the near future.
At Cisco Live Orlando 2018, Chuck reminded all of us how applaudable you network engineers and managers are. You enabled our world of internet, e-commerce, mobile devices, collaboration, AI, IoT, you name it! All was made possible by what you do.
As You Innovate…
As you and your business continue to innovate, you will face the risks that come with it, and security must be one of the top priorities. For this, Cisco has designed Cisco Tetration that brings you holistic workload protection for multicloud data centers.
Top Notch Data Center Security
To get started, the following series of light-board videos will help you understand conceptually what are the security aspects you need to pay attention to, and how Cisco Tetration can address your data center security and visibility problems. At the end of the videos, I recommend you to watch a series of demos.
From oldest to newest:
Learn how to protect cloud workload with Loy Evans, a must-have knowledge for all network/data center administrators
Learn what the differences between Whitelist and Blacklist policy are, and how you can use them for a more secured network.
Learn how to use annotations to provide key context for the information you see in Cisco Tetration and make better assessment to build a more secured data center.
See how you can solve your network visibility problems.
Learn what the differences are between network visibility and host visibility, what type information each of them present, and how to make better assessment about your network.
Loy Evans explains how Cisco Tetration gathers and analyzes data. You will understand why it’s the most advanced analytics and security tool for your data center.
Loy Evans explains how segmentation in the data center is made easy with Cisco Tetration.
Loy Evans explains why segmentation is difficult and how Cisco Tetration can make it easy.
Loy Evans explains what declarative policy is, how you can create policies within Cisco Tetration, and how to maintain a policy that is accurate, as the number of applications grow and flex dynamically.
Loy Evans dives into what types of data there are, where they come from, and how Cisco Tetration uses them. This helps explain how Cisco Tetration gathers data center insights fast and accurately.
Impressed by these concepts yet? Watch actual demos to see Cisco Tetration in action: