data center security
Your Network Is Rapidly Expanding – How do you secure it?
Today’s security teams have to mind various areas of their infrastructure, remote users and endpoints, and applications running everywhere in order to remain secure. How do you do it all?
Datacenter Security: How to Balance Business Agility with Great Protection
With rise of applications, datacenters are rapidly evolving and so are the security threats. IDC shares the approach to securing data center and how Cisco closely aligns with it.
Tetration Micro-Segmentation: Secure Your Applications and Your Seat at the Yankees Game
Whether you call it micro-segmentation, application segmentation, cloud workload protection, or Zero Trust, limiting how an application can communicate on the network is a security imperative.
Cisco Live EMEA 2019 – Barcelona gears up to host industry’s premier tech. event, second year in a row
A week from now, Cisco Live EMEA 2019 will be ready to sizzle at the Fira Barcelona Gran Via. As a Cisco Live attendee, you benefit from the opportunity to interact with your peers, Cisco staff and partner technical experts in both structured and informal settings. Our Welcome Reception and Customer Appreciation Event are the highlights of the week’s social calendar.
Cisco Tetration Deep Dive Demos: Features Walkthrough
Watch below to learn how to use the most popular features in Cisco Tetration. <span class="author-251159777 font-color-ea1f43 font-size-medium" style="color:...
Securing Hybrid Cloud Workloads with the Expanded Cisco Tetration Platform
Take a proactive approach to your security strategy through your data center - the prime target of cybercriminals.
Data Center Application Layer Attacks
There have been a number of articles written on data center outages and their business costs of lost productivity, infrastructure damage, loss of brand reputation and goodwill in the marketplace, and litigation costs. Data center outages can occur from a number of factors such as such as component quality issues, power supply disturbances, or human […]
The Dreaded “5-Tuple”
If you were to ask any security administrator who had to manage the security policies across an organization, they would probably define the “5-Tuple” as a “hard to understand, cryptic method leftover from the 1990s’ policy management for implementing access control and segmentation capabilities in networks. Despite its complexity, 5-Tuple has been a mainstay in […]
5 Areas of ROI on Data Center Security
As data center operations managers and business owners analyze their budgets to uncover economic headwinds, the importance of deriving ROI from each purchase and initiative is considered. To better understand the costs and benefits of the Cisco Secure Data Center Solution, we engaged with analyst firm Forrester to interview and study one of our customer’s […]