To be Effective, Security Needs to Be a Force Multiplier
Effective security is simple, open, and automated. We’ve already talked about simple and open. Now let’s talk about automated. Security admins can relate to this scenario. You just learned of an infected system in your environment of thousands of devices. How many others are affected? That’s hard to figure out even in elite operations. What […]
2016 Forrester TEI Study Shows TrustSec Cuts Operations Costs up to 80%
Forrester Consulting recently conducted an analysis of customers using TrustSec software-defined segmentation in production networks and deduced the following: This matters today as network segmentation in the branch, campus and data center is a critical foundation for any network defense. Effective segmentation helps protect key assets and data while preventing the dangerous lateral movements of […]
Seeing Over the Wall: Unified TrustSec-ACI Policy Monitoring with Stealthwatch and ISE v2.1
Visibility has always been a core component of building effective security policy. Starting with the discovery phase of understanding the behavior of the users and assets on a network through...
What do “Going Green” and policy group sharing have in common? More than you think!
New Cisco Identity Services Engine (ISE) v2.1 Enables TrustSec-ACI Policy Plane Integration “Going green” is all about reducing waste and protecting the environment. It’s a movement most of us believe...
Kuwait Oil Company Gets More Secure
To protect themselves from attacks, Kuwait Oil Company turned to Cisco to help manage who accesses their network, where they access it, and on what devices with centralized policy management.
Cybersecurity for Defense: Network Segmentation
Classifying and compartmentalizing information has been around within the Department of Defense before it was even called the Department of Defense. However, as DOD information that was once secured in vaults and safes has become digital data, many new regulations have been introduced that mandate how this data should be processed and handled. These regulations […]
Gartner’s perspective on Cisco TrustSec
I am very pleased to be able to share some Gartner research on TrustSec. While we’re continuing to make progress through broader product support, validation from auditors and implementation by other vendors, we believe that this research and Gartner’s perspective will provide you with a useful and informative viewpoint. To read Gartner’s perspective on TrustSec […]
Addressing Cyber-Security Challenges of Today and Tomorrow
Did you know that Cisco detects over 1.5 million intrusion attempts on Cisco’s network every day? With more than 13 billion NetFlow records captured daily, over 22 Terabytes of traffic inspected, and 750 Gigabyte of system logs collected on a daily basis, it’s changing the landscape for how to secure intellectual property, confidential information, and mitigate malicious attacks. This brief video shares relevant security […]
New Nexus 1000V Virtual Switch Release 3.1 Now Available
There has been some seismic activity happening in Bay Area and the epicenter for all Virtual Networking shifts is right here at Cisco HQ in San Jose. (Our sympathies go to all those affected by the real earthquake further to the north.) At Cisco, it’s all about the applications and the shift to dynamic network […]