TrustSec

December 19, 2016

SECURITY

To be Effective, Security Needs to Be a Force Multiplier

4 min read

Effective security is simple, open, and automated.  We’ve already talked about simple and open. Now let’s talk about automated. Security admins can relate to this scenario. You just learned of an infected system in your environment of thousands of devices. How many others are affected? That’s hard to figure out even in elite operations. What […]

September 26, 2016

SECURITY

2016 Forrester TEI Study Shows TrustSec Cuts Operations Costs up to 80%

1 min read

Forrester Consulting recently conducted an analysis of customers using TrustSec software-defined segmentation in production networks and deduced the following: This matters today as network segmentation in the branch, campus and data center is a critical foundation for any network defense. Effective segmentation helps protect key assets and data while preventing the dangerous lateral movements of […]

August 4, 2016

SECURITY

Seeing Over the Wall: Unified TrustSec-ACI Policy Monitoring with Stealthwatch and ISE v2.1

2 min read

Visibility has always been a core component of building effective security policy. Starting with the discovery phase of understanding the behavior of the users and assets on a network through...

July 7, 2016

SECURITY

What do “Going Green” and policy group sharing have in common? More than you think!

2 min read

New Cisco Identity Services Engine (ISE) v2.1 Enables TrustSec-ACI Policy Plane Integration “Going green” is all about reducing waste and protecting the environment. It’s a movement most of us believe...

Kuwait Oil Company Gets More Secure

2 min read

To protect themselves from attacks, Kuwait Oil Company turned to Cisco to help manage who accesses their network, where they access it, and on what devices with centralized policy management.

May 11, 2016

GOVERNMENT

Cybersecurity for Defense: Network Segmentation

2 min read

Classifying and compartmentalizing information has been around within the Department of Defense before it was even called the Department of Defense. However, as DOD information that was once secured in vaults and safes has become digital data, many new regulations have been introduced that mandate how this data should be processed and handled. These regulations […]

October 14, 2014

SECURITY

Gartner’s perspective on Cisco TrustSec

1 min read

I am very pleased to be able to share some Gartner research on TrustSec. While we’re continuing to make progress through broader product support, validation from auditors and implementation by other vendors, we believe that this research and Gartner’s perspective will provide you with a useful and informative viewpoint. To read Gartner’s perspective on TrustSec […]

August 26, 2014

DATA CENTER

New Nexus 1000V Virtual Switch Release 3.1 Now Available

3 min read

There has been some seismic activity happening in Bay Area and the epicenter for all Virtual Networking shifts is right here at Cisco HQ in San Jose. (Our sympathies go to all those affected by the real earthquake further to the north.)  At Cisco, it’s all about the applications and the shift to dynamic network […]

August 13, 2014

SECURITY

Putting a Damper on ‘Lateral Movement’ due to Cyber-Intrusion

2 min read

Analysis of high-profile cyber breaches often reveals how intruders gain their initial footprint in the targeted organizations and bypass perimeter defenses to establish a backdoor for persistent activities. Such stealthy activities may continue until intruders complete their ultimate mission—claiming the “crown jewels” of the victim organization. “Lateral movement” is a term increasingly used to describe […]