The Criticality of the Network in Securing IoT and Critical Infrastructure
To demonstrate the vital role of the network in IoT Security, we explore how it can help us tackle a series of IoT-related security challenges.
Business Benefits of Segmentation with Software-Defined Access
Cisco Software-Defined Access (SD-Access), working at the controller plane level, reduces complexity and improves scalability and mobility of devices—and your workforce.
Moving Towards The Zero Trust Cybersecurity Framework – A Practical Approach
The original Zero Trust model was conceived by Forrester, and leveraged by Google as part of their BeyondCorp initiative. Gartner has their framework called CARTA. These trust-centric approaches shift access decisions based on network topology to authorized users and devices. In this blog we will explore what you should consider when moving to a Zero Trust framework and how to get started.
Improve network and security operations with Firepower multi-instance and Cisco Threat Response
With our latest release, Firepower Threat Defense (FTD) 6.3, our team is delivering value and bringing new possibilities to Firepower customers of all sizes.
Automated Policy & Segmentation Violation Alerting with Stealthwatch Cloud
Stealthwatch Cloud is best known for network behavioral anomaly detection and entity modeling, but the level network visibility value it provides far exceeds these two capabilities. The underlying traffic dataset...
3 Non-Negotiables for an Effective Data Center Security & Workload Protection Strategy
We know that big data is big business… And the use of on-premises and public cloud infrastructure is growing, according to the Cisco 2018 Security Capabilities Benchmark...
Workload protection is a full cycle. Tetration uniquely delivers on it all.
With Tetration, Cisco protects application workloads wherever they are deployed, offering full cycle protection for any vendor’s infrastructure in any data center and across any cloud.