TrustSec
To be Effective, Security Needs to Be a Force Multiplier
4 min read
Effective security is simple, open, and automated. We’ve already talked about simple and open. Now let’s talk about automated. Security admins can relate to this scenario. You just learned of an infected system in your environment of thousands of devices. How many others are affected? That’s hard to figure out even in elite operations. What […]
2016 Forrester TEI Study Shows TrustSec Cuts Operations Costs up to 80%
1 min read
Forrester Consulting recently conducted an analysis of customers using TrustSec software-defined segmentation in production networks and deduced the following: This matters today as network segmentation in the branch, campus and data center is a critical foundation for any network defense. Effective segmentation helps protect key assets and data while preventing the dangerous lateral movements of […]
Seeing Over the Wall: Unified TrustSec-ACI Policy Monitoring with Stealthwatch and ISE v2.1
2 min read
Visibility has always been a core component of building effective security policy. Starting with the discovery phase of understanding the behavior of the users and assets on a network through...
What do “Going Green” and policy group sharing have in common? More than you think!
2 min read
New Cisco Identity Services Engine (ISE) v2.1 Enables TrustSec-ACI Policy Plane Integration “Going green” is all about reducing waste and protecting the environment. It’s a movement most of us believe...
Kuwait Oil Company Gets More Secure
2 min read
To protect themselves from attacks, Kuwait Oil Company turned to Cisco to help manage who accesses their network, where they access it, and on what devices with centralized policy management.
Cybersecurity for Defense: Network Segmentation
2 min read
Classifying and compartmentalizing information has been around within the Department of Defense before it was even called the Department of Defense. However, as DOD information that was once secured in vaults and safes has become digital data, many new regulations have been introduced that mandate how this data should be processed and handled. These regulations […]
Gartner’s perspective on Cisco TrustSec
1 min read
I am very pleased to be able to share some Gartner research on TrustSec. While we’re continuing to make progress through broader product support, validation from auditors and implementation by other vendors, we believe that this research and Gartner’s perspective will provide you with a useful and informative viewpoint. To read Gartner’s perspective on TrustSec […]
New Nexus 1000V Virtual Switch Release 3.1 Now Available
3 min read
There has been some seismic activity happening in Bay Area and the epicenter for all Virtual Networking shifts is right here at Cisco HQ in San Jose. (Our sympathies go to all those affected by the real earthquake further to the north.) At Cisco, it’s all about the applications and the shift to dynamic network […]
Putting a Damper on ‘Lateral Movement’ due to Cyber-Intrusion
2 min read
Analysis of high-profile cyber breaches often reveals how intruders gain their initial footprint in the targeted organizations and bypass perimeter defenses to establish a backdoor for persistent activities. Such stealthy activities may continue until intruders complete their ultimate mission—claiming the “crown jewels” of the victim organization. “Lateral movement” is a term increasingly used to describe […]