Avatar

Kevin Regan

Product Manager

Secure Access and Mobility Product Group

Kevin leads the TrustSec product management team at Cisco, which is focused on automating network security functions and removing complexity from security management in many Cisco products.

Prior to joining the development organization he worked as a security architect helping some of Cisco’s largest Enterprise customers in EMEA. He has been specialized on security at Cisco for 17 years but has also worked extensively on market data networks and multicast.

He initially worked in the car industry, developing manufacturing systems at Rover and Toyota, then joined a systems integrator focused on critical network infrastructure in process control and financial environments.

Articles

July 7, 2016

SECURITY

What do “Going Green” and policy group sharing have in common? More than you think!

New Cisco Identity Services Engine (ISE) v2.1 Enables TrustSec-ACI Policy Plane Integration “Going green” is all about reducing waste and protecting the environment. It’s a movement most of us believe in and try to live by. Who wouldn’t want to reduce waste and protect the environment? In fact, it g…

June 29, 2016

SECURITY

Cisco TrustSec, the “Swiss Army Knife” in your network security toolbox

A new approach to segmentation that simply delivers more Network segmentation has been around for quite a while as a way to isolate environments and critical systems to secure data and IT assets. Recent breaches have highlighted the value of segmentation in reducing the attack surface and preventing…

October 14, 2014

SECURITY

Gartner’s perspective on Cisco TrustSec

I am very pleased to be able to share some Gartner research on TrustSec. While we’re continuing to make progress through broader product support, validation from auditors and implementation by other vendors, we believe that this research and Gartner’s perspective will provide you with a useful and i…

August 13, 2014

SECURITY

Putting a Damper on ‘Lateral Movement’ due to Cyber-Intrusion

Analysis of high-profile cyber breaches often reveals how intruders gain their initial footprint in the targeted organizations and bypass perimeter defenses to establish a backdoor for persistent activities. Such stealthy activities may continue until intruders complete their ultimate mission—claimi…

February 3, 2014

SECURITY

Taking Complexity Out of Network Security – Simplifying Firewall Rules with TrustSec

Bruce Schneier, the security technologist and author famously said, “Complexity is the worst enemy of security.” We have been working with some customers who agree strongly with this sentiment because they have been struggling with increasing complexity in their access control lists and firewall rul…

January 28, 2014

SECURITY

Just Announced at Cisco Live! Milan – Cisco is Opening TrustSec Capabilities to Other Vendors

With encouragement from customers, Cisco has submitted the TrustSec protocol that we use to exchange role and context information between network devices to the IETF. Chris Young, Senior Vice President of Cisco Security, shared the news during his keynote address at Cisco Live! Milan. The Source-gro…