Datacenter Security: How to Balance Business Agility with Great Protection
With rise of applications, datacenters are rapidly evolving and so are the security threats. IDC shares the approach to securing data center and how Cisco closely aligns with it.
Enterprise Networking in 2020: 5 Trends to Watch in Wireless, SD-WAN, More
Networking isn’t what it used to be. The epicenter of networking has moved from company-owned datacenters to the cloud. Wireless networks also change how we connect our locations together, how we think about security, the economics of networking, and how we take care of them. 2020 is going to be an exciting year, where Wireless is not just Wi-Fi or 5G—it’s both.
The Criticality of the Network in Securing IoT and Critical Infrastructure
To demonstrate the vital role of the network in IoT Security, we explore how it can help us tackle a series of IoT-related security challenges.
Business Benefits of Segmentation with Software-Defined Access
Cisco Software-Defined Access (SD-Access), working at the controller plane level, reduces complexity and improves scalability and mobility of devices—and your workforce.
It’s 9am. Do you know where your data is?
‘Data center anywhere’ requires security everywhere - Bobby Guhasarkar, January 29, 2019 It’s 9am. Do you know where your data is? If you’re like most businesses today, it’s everywhere....
Moving Towards The Zero Trust Cybersecurity Framework – A Practical Approach
The original Zero Trust model was conceived by Forrester, and leveraged by Google as part of their BeyondCorp initiative. Gartner has their framework called CARTA. These trust-centric approaches shift access decisions based on network topology to authorized users and devices. In this blog we will explore what you should consider when moving to a Zero Trust framework and how to get started.
Improve network and security operations with Firepower multi-instance and Cisco Threat Response
With our latest release, Firepower Threat Defense (FTD) 6.3, our team is delivering value and bringing new possibilities to Firepower customers of all sizes.
Automated Policy & Segmentation Violation Alerting with Stealthwatch Cloud
Stealthwatch Cloud is best known for network behavioral anomaly detection and entity modeling, but the level network visibility value it provides far exceeds these two capabilities. The underlying traffic dataset...
3 Non-Negotiables for an Effective Data Center Security & Workload Protection Strategy
We know that big data is big business… And the use of on-premises and public cloud infrastructure is growing, according to the Cisco 2018 Security Capabilities Benchmark...