Segmentation

October 26, 2020

NETWORKING

Giving SecOps a New Weapon with Security Group Access Control Lists

Segmenting networks using Security Group Access Control Lists (SGACL) reduces the threat surface by limiting the reach of attacks in east-west traffic to within segments. By sending the permit and deny logs generated by the SGACLs to SIEM applications, SecOps can analyze and correlate them with indicators of compromise generated by other security appliances.

August 25, 2020

NETWORKING

Identify Endpoints, Enforce Policies, and Stop Threats with Network Segmentation

Granular network segmentation is the preferred defensive method to prevent the lateral spread of threats through networks. It is also ideal to enforce policies that restrict access to applications by trusted devices and individuals. Automation for identifying, grouping, and enforcing segmentation policies is key to securing networks of all sizes.

The four-step journey to securing the industrial network

IT and OT environments are very different. This post looks at the key differences and provides a four-step approach to securing the industrial network.

March 31, 2020

SECURITY

Zero chance of tackling zero trust without a platform approach

Zero trust has become an important paradigm for adequately securing an enterprise environment. But not all zero trust models are created equal…

February 6, 2020

INTERNET OF THINGS (IOT)

Cisco Cyber Vision: Under the hood

Take a deep dive into Cisco’s new IoT security solution Cisco Cyber Vision.

December 18, 2019

NETWORKING

Enterprise Networking in 2020: 5 Trends to Watch in Wireless, SD-WAN, More

Networking isn’t what it used to be. The epicenter of networking has moved from company-owned datacenters to the cloud. Wireless networks also change how we connect our locations together, how we think about security, the economics of networking, and how we take care of them. 2020 is going to be an exciting year, where Wireless is not just Wi-Fi or 5G—it’s both.

September 25, 2019

SECURITY

The Criticality of the Network in Securing IoT and Critical Infrastructure

To demonstrate the vital role of the network in IoT Security, we explore how it can help us tackle a series of IoT-related security challenges.