Segmentation

Cisco Cyber Vision: Under the hood

It’s an exciting time for organizations that are migrating to Industry 4.0. Over the last few decades, industrial control systems (ICS) have enabled modern industrial automation. Today, Industrial Internet of Things (IIoT) technologies present new opportunities to increase operational efficiency and launch a new generation of industrial products and services.   But first, organizations must address […]

December 18, 2019

NETWORKING

Enterprise Networking in 2020: 5 Trends to Watch in Wireless, SD-WAN, More

Networking isn’t what it used to be. The epicenter of networking has moved from company-owned datacenters to the cloud. Wireless networks also change how we connect our locations together, how we think about security, the economics of networking, and how we take care of them. 2020 is going to be an exciting year, where Wireless is not just Wi-Fi or 5G—it’s both.

September 25, 2019

SECURITY

The Criticality of the Network in Securing IoT and Critical Infrastructure

To demonstrate the vital role of the network in IoT Security, we explore how it can help us tackle a series of IoT-related security challenges.

September 10, 2019

NETWORKING

Business Benefits of Segmentation with Software-Defined Access

Cisco Software-Defined Access (SD-Access), working at the controller plane level, reduces complexity and improves scalability and mobility of devices—and your workforce.

January 29, 2019

SECURITY

It’s 9am. Do you know where your data is?

‘Data center anywhere’ requires security everywhere - Bobby Guhasarkar, January 29, 2019 It’s 9am. Do you know where your data is? If you’re like most businesses today, it’s everywhere....

January 8, 2019

SECURITY

Moving Towards The Zero Trust Cybersecurity Framework – A Practical Approach

The original Zero Trust model was conceived by Forrester, and leveraged by Google as part of their BeyondCorp initiative. Gartner has their framework called CARTA. These trust-centric approaches shift access decisions based on network topology to authorized users and devices. In this blog we will explore what you should consider when moving to a Zero Trust framework and how to get started.

December 4, 2018

SECURITY

Improve network and security operations with Firepower multi-instance and Cisco Threat Response

With our latest release, Firepower Threat Defense (FTD) 6.3, our team is delivering value and bringing new possibilities to Firepower customers of all sizes.

September 19, 2018

SECURITY

Automated Policy & Segmentation Violation Alerting with Stealthwatch Cloud

Stealthwatch Cloud is best known for network behavioral anomaly detection and entity modeling, but the level network visibility value it provides far exceeds these two capabilities. The underlying traffic dataset...