Cisco TrustSec
Cisco TrustSec, the “Swiss Army Knife” in your network security toolbox
3 min read
A new approach to segmentation that simply delivers more Network segmentation has been around for quite a while as a way to isolate environments and critical systems to secure data and IT assets. Recent breaches have highlighted the value of segmentation in reducing the attack surface and preventing the lateral movement of targeted malware. But […]
Improve Your Backbone, Improve Your Business
2 min read
Cisco recently announced the Cisco Catalyst 6840-X backbone switch to address new network backbone needs, especially in space constrained deployments. According to the Visual Networking Index, Network traffic has grown exponentially over the last several years, and this trend is expected to continue into the foreseeable future. By 2018, there will be over 20 billion […]
The Network as a Security Sensor and Enforcer
3 min read
The Digital Economy and the Internet of Everything means everything is now connected. Digitization is fundamentally transforming how we conduct business. It creates new opportunities to develop services...
New IT Harvest White Paper: How Policy-Based Software Defined Segmentation and Cisco TrustSec Improve Security
1 min read
IT-Harvest, founded by renowned security expert and industry analyst Richard Stiennon, provides reports, analysis, and advisory services on trends in emerging threats and the technology to counter them. Richard Stiennon is one of the most followed and well-respected IT security analysts and authors in the world. His recent white paper discusses why network segmentation is […]
Cisco ISE 1.3: Welcomed Improvements
6 min read
I’ve finally had a chance to stop and smell the roses. The roses being Cisco ISE 1.3 that is. It’s been a much anticipated update to Cisco’s core TrustSec component and there are a number of improvements, many dealing with Guest users. So what has Cisco done to improve? Let’s look at 5 areas related […]
Access Control with Cisco TrustSec: Moving from “IP Addresses” to “Roles and Attributes”
4 min read
Today’s enterprise is a highly dynamic, and hyper connected environment where IT plays a critical role in connecting the users, devices, resources and corporate IT systems. Today’s employees are also highly mobile in nature and do not necessarily have a single workspace assignment. The IT departments are constantly being challenged by the organization’s Line of […]
Judge for yourself: Taking Dell to task on “holistic” security claims
In case you missed it, Network World’s Ellen Messmer published a rather surprising article on how Dell was going to “trump” Cisco in the information security market as a result of some recent acquisitions. Now certainly Dell is entitled to their beliefs. They’re in a difficult position right now, as Michael Dell and Silver Lake […]
1