Part 1: Why Is Enabling Only Authorized Users So Complex?
In the past, a critical component of preventing threats was understanding and controlling network access and access to network resources based on role, while also denying access for unauthorized users and devices. However, assuring this secure network access has been increasingly difficult due to: Complexity in understanding more than just who, but how, by what, […]
MegaTrends: Cisco TrustSec from User Access to the Data Centre
In my previous Blogs I have talked about Megatrends including BYOD, the Next-Generation Workspace, Video and the Internet of Things. One unfortunate reality all of these trends have in common is that they are going to put additional stress on your current Network and Security Infrastructure and Operational Process. TrustSec uniquely offers the welcome opportunity […]