Segmentation
Giving SecOps a New Weapon with Security Group Access Control Lists
Segmenting networks using Security Group Access Control Lists (SGACL) reduces the threat surface by limiting the reach of attacks in east-west traffic to within segments. By sending the permit and deny logs generated by the SGACLs to SIEM applications, SecOps can analyze and correlate them with indicators of compromise generated by other security appliances.
Identify Endpoints, Enforce Policies, and Stop Threats with Network Segmentation
Granular network segmentation is the preferred defensive method to prevent the lateral spread of threats through networks. It is also ideal to enforce policies that restrict access to applications by trusted devices and individuals. Automation for identifying, grouping, and enforcing segmentation policies is key to securing networks of all sizes.
The four-step journey to securing the industrial network
Just as the digitization and increasing connectivity of business processes has enlarged the attack surface of the IT environment, so too has the digitization and increasing connectivity of industrial processes broadened the attack surface for industrial control networks. Though they share this security risk profile, the operational technology (OT) environment is very different from that […]
How to Strengthen Your Security in 2020
With so many attack vectors and devices to keep track of, how can we best strengthen security in 2020? Which of the security technologies out there will help us most?
Zero chance of tackling zero trust without a platform approach
Zero trust has become an important paradigm for adequately securing an enterprise environment. But not all zero trust models are created equal…
Cisco Cyber Vision: Under the hood
It’s an exciting time for organizations that are migrating to Industry 4.0. Over the last few decades, industrial control systems (ICS) have enabled modern industrial automation. Today, Industrial Internet of Things (IIoT) technologies present new opportunities to increase operational efficiency and launch a new generation of industrial products and services. But first, organizations must address […]
Datacenter Security: How to Balance Business Agility with Great Protection
With rise of applications, datacenters are rapidly evolving and so are the security threats. IDC shares the approach to securing data center and how Cisco closely aligns with it.
Enterprise Networking in 2020: 5 Trends to Watch in Wireless, SD-WAN, More
Networking isn’t what it used to be. The epicenter of networking has moved from company-owned datacenters to the cloud. Wireless networks also change how we connect our locations together, how we think about security, the economics of networking, and how we take care of them. 2020 is going to be an exciting year, where Wireless is not just Wi-Fi or 5G—it’s both.
The Criticality of the Network in Securing IoT and Critical Infrastructure
To demonstrate the vital role of the network in IoT Security, we explore how it can help us tackle a series of IoT-related security challenges.
2