Zero Trust
Complete and continuous remote worker visibility with Network Visibility Module data as a primary telemetry source
5 min read
Cisco Secure Network Analytics delivers complete and continuous remote worker visibility to extend zero-trust to any device globally with AnyConnect Network Visibility Module (NVM) data a primary telemetry source!
TrustSec Policy Analytics – Part Three: Policy Validation
5 min read
TrustSec Policy Analytics – Part Three delves deeper into how users can validate policies and accelerate group-based policy adoption through policy visualization with Cisco Secure Network Analytics’ new TrustSec Analytics reports.
Campus Segmentation Using Cisco SD-Access for the Enterprise
3 min read
Cisco SD-Access provides a network fabric technology with flexible IP addressing and hierarchical segmentation that can easily scale to create a virtual network that greatly reduces the attack surface.
TrustSec Policy Analytics – Part Two: Policy Visualization
5 min read
TrustSec Policy Analytics – Part Two delves deeper into how users can validate policies and accelerate group-based policy adoption through policy visualization with Cisco Secure Network Analytics’ new TrustSec Analytics reports.
Introducing continuous remote worker visibility and expanded data collection with Secure Network Analytics Release 7.3.2
5 min read
With Cisco Secure Network Analytics release, 7.3.2 users can gain complete and continuous remote worker visibility, expand data collection capabilities to experience further extended visibility and enhanced context, and more!
TrustSec Policy Analytics – Part One: What are policy analytics?
4 min read
Cisco Secure Network Analytics' new TrustSec Analytics reports enable users to visualize group communications, validate policies, streamline policy violation investigations, and accelerate policy adoption efforts
Cybersecurity Executive Order: Cisco Stands Ready
3 min read
Recently, the Biden Administration issued a new executive order on improving the nation’s cybersecurity. Cisco stands ready to assist - discover the technologies that will make it happen in our latest blog.
Three ways ISE 3.0 enables visibility-driven network segmentation to gain zero trust
3 min read
ISE 3.0 takes a big leap forward to simplify and ease the deployment of network segmentation, while giving customers the visibility they require to ensure this level of protection doesn’t shut down business objectives. Read our blog to learn more.
Canadian Bacon – Zero to Hero when it comes to Zero-Trust
5 min read
Zero-Trust means a lot of different things to a lot of different people but we can all agree that zero-trust means exactly that! We will focus on a use case to define an approach we can take to determine the capabilities required to achieve zero-trust.