TrustSec
Visualize, validate policy and increase remote worker telemetry with Network Analytics Release 7.3.1
How can we simplify remote access, provide resiliency for telemetry sources, reduce organizational risk AND provide the visibility into policy required to embrace zero trust and network segmentation? Read the Cisco Secure Network Analytics Release 7.3.1 blog to find out.
Understanding Medical Device Security
The FDA recall of a medical device last week has caused a bit of a media storm as the general public scrambles to find out more. The fact that a medical device meant to help sustain life is insecure and could be hacked to kill a patient is alarming to all of us. More worrying […]
What is an Intuitive Network?
How well do you understand what Cisco just announced? If you are the slight bit technical or just curious what the reality is behind all the grand talk...check out these shortcut videos from TechWiseTV.
Addressing Healthcare Security Challenges
It’s a gross understatement to say that security is critical in healthcare, where a breach can not only impact an organization’s effectiveness and reputation but also affect patient privacy and—worst-case scenario—health and safety. If you are reading this blog, you no doubt already know the most common challenges to securing digital healthcare organizations, from ensuring […]
Enterprise Network Security: Is it in your DNA?
With new capabilities on ISE and TrustSec, Cisco is now the first in the industry to deliver software-defined segmentation - from the network to the endpoint to the cloud - with complete application visibility.
Visibility is the new perimeter; It’s time for Cisco ISE 2.2
Visibility doesn’t just mean seeing data move within the network – it also means seeing who and what is on the network. Trends like the Internet of Things (IoT) and Enterprise Mobility – that will result in tens of billions of connected devices and users – are fundamentally changing the enterprise networking environment. Not knowing […]
To be Effective, Security Needs to Be a Force Multiplier
Effective security is simple, open, and automated. We’ve already talked about simple and open. Now let’s talk about automated. Security admins can relate to this scenario. You just learned of an infected system in your environment of thousands of devices. How many others are affected? That’s hard to figure out even in elite operations. What […]
2016 Forrester TEI Study Shows TrustSec Cuts Operations Costs up to 80%
Forrester Consulting recently conducted an analysis of customers using TrustSec software-defined segmentation in production networks and deduced the following: This matters today as network segmentation in the branch, campus and data center is a critical foundation for any network defense. Effective segmentation helps protect key assets and data while preventing the dangerous lateral movements of […]
Seeing Over the Wall: Unified TrustSec-ACI Policy Monitoring with Stealthwatch and ISE v2.1
Visibility has always been a core component of building effective security policy. Starting with the discovery phase of understanding the behavior of the users and assets on a network through...
1