Cisco Tetration

June 8, 2021

DEVELOPER

Control Cisco Secure Workload Using APIs, Ansible, and Terraform

Learn how to provide policy lifecycle services, micro-segmentation, and cloud workload protection using open APIs, Ansible, and Terraform

January 14, 2021

SECURITY

Cisco Secure Workload Immediate Actions in Response to “SUNBURST” Trojan and Backdoor

Cisco Secure Workload can directly support both initial steps to assist in the identification of compromised assets and the application of network restrictions to control network traffic through central automation of distributed firewalls at the workload level.

November 2, 2020

DATA CENTER

Securing Applications and Infrastructure Beyond the Data Center

Applications and infrastructure have become highly dynamic and distributed. While this gives IT professionals, DevOps specialists and business teams tremendous flexibility and agility, it also expands an organization’s attack surface. Learn how Cisco customers are securing every layer of the network.

Why 5G is Changing our Approach to Security

5G is an evolving architecture which will require enhanced security mechanisms to cater to the widened threat surface. Cybersecurity is foundational to realizing dependable and resilient 5G services. Cisco’s 5G solution has security included as a foundation. Government regulators and network operators must work hand-in-hand to ensure cybersecurity best practices and capabilities are designed into 5G infrastructure and operations right from the start.

May 20, 2020

SECURITY

Announcing Cisco Tetration SaaS Offering Available in Europe

Tetration SaaS for workload security is now available in Europe. European enterprise, public sector or startup organizations now have a SaaS-based workload security solution, hosted in Europe. Take advantage of the security, scalability, and reliability of the Tetration SaaS platform to innovate and iterate faster; securely.

May 19, 2020

DATA CENTER

Tips for Avoiding Common Pitfalls when it’s time to refresh the database

The enterprise database manages the life blood of the organization, which includes the third rail of database deployments. So how do IT administrators keep this data protected and secured for 24/7 access all while staying compliant with database updates?