Cisco Secure Workload
Mitigating Dynamic Application Risks with Secure Firewall Application Detectors
3 min read
The new Secure Firewall Application Detectors portal, https://appid.cisco.com, provides the latest application risk information available in cybersecurity
Back to the Future of Firewall
9 min read
Network firewall is not dead, but it must evolve to combat the insertion and visibility challenges. Grab an early look into this product transformation.
Control Cisco Secure Workload Using APIs, Ansible, and Terraform
4 min read
Learn how to provide policy lifecycle services, micro-segmentation, and cloud workload protection using open APIs, Ansible, and Terraform
Secure Workload and Secure Firewall – Unified Segmentation
3 min read
Firewalls must keep pace with today’s dynamic applications. Now, Cisco NetWORK redefines network security, empowering NetOps to run at DevOps speed. Automated dynamic policies integrate network and workload-level control, securing CI/CD environments.
NetWORK: Redefining Network Security
4 min read
It’s a new day for network security. Major Secure Firewall announcements: announcing Secure Firewall Threat Defense 7.0 and our NetWORK security vision.
Threat Explainer: Supply Chain Attacks
6 min read
In a supply chain attack, bad actors target companies you rely upon to get to your organization. This Threat Explainer blog discusses how to defend against them.
Securing AWS EKS Environments
1 min read
Today’s dynamic multi-cloud application environments change rapidly — on a daily, or even hourly, basis. How can you ensure manageable, efficient security without compromising agility? Learn how Cisco #SecureWorkload can help.
Secure Workload Protection: Extending Micro Perimeters and Automation to Enterprise IaaS
3 min read
Cisco Secure Workload’s native integration with Firepower Management Center allows micro-segmentation policies to be pushed to Cisco firewalls, extending workload micro perimeters with macro network perimeter enforcement.
Desktops in the Data Center: Establishing ground rules for VDI
4 min read
Provide zero trust segmentation for VDI endpoints AND applications. Administrators can centrally define and enforce dynamic segmentation policies to each and every desktop instance and application workload.