Security Group tags
Announcing: New Catalyst 3850 SFP Fiber Switch Models Expand Cisco Unified Access
2 min read
Over a year ago, Cisco launched its first flagship Catalyst 3850 series switches at Cisco Live London. With its integrated wireless LAN controller functionality and the innovative UADP ASIC, the Catalyst 3850 switches provide a converged wired and wireless platform that is the heart of “One Network” in the Cisco Unified Access “One Policy. One […]
Taking Complexity Out of Network Security – Simplifying Firewall Rules with TrustSec
3 min read
Bruce Schneier, the security technologist and author famously said, “Complexity is the worst enemy of security.” We have been working with some customers who agree strongly with this sentiment because they have been struggling with increasing complexity in their access control lists and firewall rules. Typical indicators of operational complexity have been: The time that […]
Access Control with Cisco TrustSec: Moving from “IP Addresses” to “Roles and Attributes”
4 min read
Today’s enterprise is a highly dynamic, and hyper connected environment where IT plays a critical role in connecting the users, devices, resources and corporate IT systems. Today’s employees are also highly mobile in nature and do not necessarily have a single workspace assignment. The IT departments are constantly being challenged by the organization’s Line of […]
Security: Front and Center at Cisco Live Cancun 2013
4 min read
This year I was honored to be able to present and participate at Cisco Live Cancun, which took place last week. Many attendees from North, Central and South America and...
Demystifying the Catalyst: Cisco Context Aware Secure Access (Security Group Tags – SGT) Technology
In this blog, let us take a look at how Catalyst access switches enable and enforce context aware access to IT resources. Many types of devices, including laptops, smartphones, and tablets, are used by end users to connect to the network wired, wirelessly, and remotely through VPN. With bring your own device (BYOD) access, the […]
8