The capability to stream full telemetry information directly from Catalyst switches provides operational status of the network as well as Deep Packet Inspection of traffic flows so that Cisco DNA Center can detect the true purposes of device-to-device communications and thwart the spread of attacks on IoT devices.
Segmenting networks using Security Group Access Control Lists (SGACL) reduces the threat surface by limiting the reach of attacks in east-west traffic to within segments. By sending the permit and deny logs generated by the SGACLs to SIEM applications, SecOps can analyze and correlate them with indicators of compromise generated by other security appliances.
Granular network segmentation is the preferred defensive method to prevent the lateral spread of threats through networks. It is also ideal to enforce policies that restrict access to applications by trusted devices and individuals. Automation for identifying, grouping, and enforcing segmentation policies is key to securing networks of all sizes.
IT and OT environments are very different. This post looks at the key differences and provides a four-step approach to securing the industrial network.
With so many attack vectors and devices to keep track of, how can we best strengthen security in 2020? Which of the security technologies out there will help us most?
With rise of applications, datacenters are rapidly evolving and so are the security threats. IDC shares the approach to securing data center and how Cisco closely aligns with it.