Cisco Secure Workload
NetWORK: Redefining Network Security
4 min read
It’s a new day for network security. Major Secure Firewall announcements: announcing Secure Firewall Threat Defense 7.0 and our NetWORK security vision.
Threat Explainer: Supply Chain Attacks
6 min read
In a supply chain attack, bad actors target companies you rely upon to get to your organization. This Threat Explainer blog discusses how to defend against them.
Securing AWS EKS Environments
1 min read
Today’s dynamic multi-cloud application environments change rapidly — on a daily, or even hourly, basis. How can you ensure manageable, efficient security without compromising agility? Learn how Cisco #SecureWorkload can help.
Secure Workload Protection: Extending Micro Perimeters and Automation to Enterprise IaaS
3 min read
Cisco Secure Workload’s native integration with Firepower Management Center allows micro-segmentation policies to be pushed to Cisco firewalls, extending workload micro perimeters with macro network perimeter enforcement.
Desktops in the Data Center: Establishing ground rules for VDI
4 min read
Provide zero trust segmentation for VDI endpoints AND applications. Administrators can centrally define and enforce dynamic segmentation policies to each and every desktop instance and application workload.
Cisco Secure Workload Immediate Actions in Response to “SUNBURST” Trojan and Backdoor
4 min read
Cisco Secure Workload can directly support both initial steps to assist in the identification of compromised assets and the application of network restrictions to control network traffic through central automation of distributed firewalls at the workload level.
Network Security and Containers – Same, but Different
6 min read
Enable developers to have policy co-located with software code, and automated deployment with same CI/CD pipelines provides speed, agility, policy ubiquity for every environment, resulting in strategic competitive advantages.
The Darkness and the Light
7 min read
Reduce your business risk by securing your workloads. Be vigilant in monitoring and revisiting the basics often. By questioning everything, and focusing on the basics, you will achieve better security.
Protecting Workloads Across Any Cloud and Application…Anywhere!
2 min read
See how to automate and implement a secure, zero-trust model for micro-segmentation based on application behavior and telemetry using Cisco Secure Workload (formerly known as Tetration).