microsegmentation
Are you leaving your most valued assets up for grabs?
2 min read
How do you secure your most valued assets—applications? Apps are the number 1 moving target for sophisticated attacks. Read more to see how micro-segmentation with Cisco Tetration can take help you automate security for your applications.
Forrester’s Zero Trust or Gartner’s Lean Trust?
4 min read
Whether you tell your boardroom that you’re going to adopt zero trust or lean trust, you need to decide how and where to start your multi-year journey. This blog explores 2 common approaches to zero trust, Forrester's Zero Trust eXtented (ZTX) and Gartner's CARTA approach, and how Cisco can help you on your journey to better trust-centric security.
Better Services and a Safer Data Center: Tetration in Action at UNC – Charlotte
1 min read
At the end of the day, technology is at its best when it’s helping people - empowering them to accomplish their goals.
What’s new with ACI Micro Segmentation
9 min read
I can’t believe it has been a year since I wrote the blog series (part-I, part-II, part-III and
How to Secure Your Data Centre: The Importance of Whitelist Policies
8 min read
Growing up in Britain, a fair share of our history lessons covered the black death. It was a truly horrible plague that affected all without prejudice, ravaging the young and old throughout towns, cities, countries and the continent with seemingly no end. Surprisingly, it’s hard to remember everything from that class (hey, it was quite […]
Micro Segmentation and Cisco ACI – From Theory to Practice Part IV
8 min read
This is Part IV in a four part series of blogs. This blog has been co-written with Vincent Esposito (@vesposit) This is the last of a series of blogs...
Micro Segmentation and Cisco ACI – From Theory to Practice Part II
6 min read
This is Part II in a four part series of blogs. This is the second of a series of blogs where we will illustrate how to leverage Cisco ACI to implement Micro Segmentation. In the first blog we described how to use ACI micro segmentation to implement a web application that uses a tier of […]
Microsegmentation with Cisco ACI
2 min read
Modern data centers are under unrelenting attack. East-west traffic security breaches are happening every day. According to Cisco, 75 percent of all attacks take only minutes to begin stealing data but take longer to detect. Once discovered, several weeks may pass before full containment and remediation are achieved. Today’s data centers require a variety of […]
1