Cisco Secure Workload (Tetration) expands microsegmentation and workload security capabilities
Available now: new Cisco Tetration micro-segmentation and workload protection features to achieve the protection required for today's heterogeneous multicloud environments.
New research shows businesses are struggling to secure applications – here’s what you can do
New research shows businesses are struggling to secure applications. To stop this trend, you need closer, continuous and adaptive security.
Tetration Micro-Segmentation: Secure Your Applications and Your Seat at the Yankees Game
Whether you call it micro-segmentation, application segmentation, cloud workload protection, or Zero Trust, limiting how an application can communicate on the network is a security imperative.
Workload protection is a full cycle. Tetration uniquely delivers on it all.
With Tetration, Cisco protects application workloads wherever they are deployed, offering full cycle protection for any vendor’s infrastructure in any data center and across any cloud.
Micro Segmentation and Cisco ACI – From Theory to Practice Part II
This is Part II in a four part series of blogs. This is the second of a series of blogs where we will illustrate how to leverage Cisco ACI to implement Micro Segmentation. In the first blog we described how to use ACI micro segmentation to implement a web application that uses a tier of […]
Micro Segmentation and Cisco ACI – From Theory to Practice
This is Part I in a four part series of blogs. Micro-segmentation has become a buzzword in the networking industry. Leaving the term and the marketing aside, it is easy to understand why customers are interested in the benefits that Micro-segmentation provides. The primary advantage of Micro-segmentation is to reduce the attack surface by minimizing […]
Micro-segmentation: Enhancing Security and Operational Simplicity with Cisco ACI
(This blog has been developed in association with Praveen Jain, VP, Engineering of Cisco’s Application Policy Infrastructure Controller, Juan Lage, Principal Engineer and others) Security is top of mind in today’s data center and cloud deployments and security architectures have continued to evolve even as new threats manifest themselves in the digital world. Today’s security […]