SD-Access
Cisco Software-Defined Access for Industry Verticals
Learn about the new design guide, which provides an overview of Cisco SD-Access as well as how it can solve industry vertical challenges.
ISE business value and ROI uncovered in Forrester study
Looking to deploy ISE? Forrester conducted a study to uncover the business value and ROI of Cisco Identity Services Engine (ISE) and revealed a 191% return.
Cisco SD-Access in Healthcare: A Comprehensive Secure Access Solution for a Changing Industry
Healthcare IT is using Cisco SD-Access to address changing network requirements in a dynamic industry facing pandemic disruptions, privacy regulations, and the need for secure remote telemedicine.
Trust Analytics and Anti-Spoofing Protection: It’s Already in Your Network
Trust Analytics protects your organization from ransomware with AI/ML-based anti-spoofing technology by lowering a device's Trust Score when it exhibits unusual behavior typical of a rogue device attacking the network.
A simpler, more flexible SD-WAN design for branches, from Customer Zero. Top five benefits
A simpler, more flexible SD-WAN network, as led by the Customer Zero team in Cisco IT. This blog explains how we built the fabric and summarizes the benefits to date.
Journey to a software-defined access fabric network, part 2
In this two-part blog series, Travis describes Cisco IT’s motivations for shifting to a software-defined access fabric network and our guiding principles for implementing Cisco Software-Defined Access (SD-Access), along with lessons learned and outcomes achieved thus far.
Measuring the impact of a software-defined access fabric network
Joel explains the value framework Cisco IT created to measure SD-Access’s impact, along with outcomes achieved to date.
The journey to end-to-end networking starts with Cisco’s Multidomain for IBN
There are many ways to multidomain IBN. Consider the specific needs of each domain, which will ultimately allow you to integrate access, data center and WAN together.
Identify Endpoints, Enforce Policies, and Stop Threats with Network Segmentation
Granular network segmentation is the preferred defensive method to prevent the lateral spread of threats through networks. It is also ideal to enforce policies that restrict access to applications by trusted devices and individuals. Automation for identifying, grouping, and enforcing segmentation policies is key to securing networks of all sizes.