Identity Services Engine

September 10, 2019

ENTERPRISE NETWORKS

Business Benefits of Segmentation with Software-Defined Access

Cisco Software-Defined Access (SD-Access), working at the controller plane level, reduces complexity and improves scalability and mobility of devices—and your workforce.

August 26, 2018

SECURITY

Protecting SugarCreek’s 24/7 Food Manufacturing Across Four States

SugarCreek Brandworthy food solutions is a growing, mid-western food manufacturer helping some of the industry’s largest and best-known companies develop innovative food solutions.

August 14, 2018

SECURITY

Security Automation: Putting the odds ever in your favor

“May the odds be ever in your favor…” It was the irony of this pithy statement that sent the Hunger Games heroine, Katniss Everdeen, to an almost certain death....

August 1, 2018

ENTERPRISE NETWORKS

Shining a Light on Shadow IT

Shadow #IT projects will continue to take root and proliferate throughout enterprise #networks.

May 4, 2018

SECURITY

Setting the standard: Cisco ISE wins trust award for best NAC solution at SC Awards 2018

Many professional athletes would say that while winning the first championship is unforgettable, its winning back-to-back championships—or even accomplishing the rare three-peat—that carries special meaning as it requires an enduring...

February 21, 2017

ENTERPRISE NETWORKS

Enterprise Network Security: Is it in your DNA?

With new capabilities on ISE and TrustSec, Cisco is now the first in the industry to deliver software-defined segmentation - from the network to the endpoint to the cloud - with complete application visibility.

Kuwait Oil Company Gets More Secure

To protect themselves from attacks, Kuwait Oil Company turned to Cisco to help manage who accesses their network, where they access it, and on what devices with centralized policy management.

May 11, 2016

GOVERNMENT

Cybersecurity for Defense: Network Segmentation

Classifying and compartmentalizing information has been around within the Department of Defense before it was even called the Department of Defense. However, as DOD information that was once secured in vaults and safes has become digital data, many new regulations have been introduced that mandate how this data should be processed and handled. These regulations […]

June 9, 2015

SECURITY

Hosted Identity Services: Scaling Security in the Age of Mobility

The rapid expansion of connected devices is a double-edged sword for businesses. On one hand, mobility, cloud, and BYOD innovations enable unprecedented flexibility, collaboration, and ease of access for employees. Fifty percent of employers will adopt BYOD policies by 2017, and 90 percent of American workers are already using their own smartphones for work.[1] But […]