Segmentation

August 19, 2021

NETWORKING

Catalyst 9000 Simplifies Network-Based Threat Detection Using Inline Security Telemetry

3 min read

The capability to stream full telemetry information directly from Catalyst switches provides operational status of the network as well as Deep Packet Inspection of traffic flows so that Cisco DNA Center can detect the true purposes of device-to-device communications and thwart the spread of attacks on IoT devices.

June 10, 2021

NETWORKING

Establish, Enforce, and Continuously Verify Trust with SD-Access in Simple Steps

6 min read

Learn how the new capabilities of Cisco SD-Access support a flexible journey to the zero-trust enterprise.

October 26, 2020

NETWORKING

Giving SecOps a New Weapon with Security Group Access Control Lists

4 min read

Segmenting networks using Security Group Access Control Lists (SGACL) reduces the threat surface by limiting the reach of attacks in east-west traffic to within segments. By sending the permit and deny logs generated by the SGACLs to SIEM applications, SecOps can analyze and correlate them with indicators of compromise generated by other security appliances.

August 25, 2020

NETWORKING

Identify Endpoints, Enforce Policies, and Stop Threats with Network Segmentation

6 min read

Granular network segmentation is the preferred defensive method to prevent the lateral spread of threats through networks. It is also ideal to enforce policies that restrict access to applications by trusted devices and individuals. Automation for identifying, grouping, and enforcing segmentation policies is key to securing networks of all sizes.

The four-step journey to securing the industrial network

2 min read

IT and OT environments are very different. This post looks at the key differences and provides a four-step approach to securing the industrial network.

March 31, 2020

SECURITY

Zero chance of tackling zero trust without a platform approach

5 min read

Zero trust has become an important paradigm for adequately securing an enterprise environment. But not all zero trust models are created equal…