TrustSec Policy Analytics – Part Three delves deeper into how users can validate policies and accelerate group-based policy adoption through policy visualization with Cisco Secure Network Analytics’ new TrustSec Analytics reports.
TrustSec Policy Analytics – Part Two delves deeper into how users can validate policies and accelerate group-based policy adoption through policy visualization with Cisco Secure Network Analytics’ new TrustSec Analytics reports.
Granular network segmentation is the preferred defensive method to prevent the lateral spread of threats through networks. It is also ideal to enforce policies that restrict access to applications by trusted devices and individuals. Automation for
Yesterday, Mike Cohen’s post Networking Containers: Policy Finally Comes of Age appeared on the Open Networking User Group blog site. He talks about the tremendous interest among application developers to use Linux containers to develop
Welcome to Tokyo, Japan. The OpenStack Summit is a four-day conference for developers, users, and administrators of OpenStack Cloud Software. It’s a great place to learn about how Application Centric Infrastructure (ACI) makes it better to Build
On January 13, 2015, Cisco will celebrate a year of industry adoption of Application Centric Infrastructure (ACI), a ground breaking SDN architecture. It will include a public
Over the past several years, I’ve been lucky enough to be a part of two important trends in the networking industry - the evolution of open standards and open APIs,...