data center security
Datacenter Security: How to Balance Business Agility with Great Protection
When IDC consults with enterprise customers or performs worldwide surveys, security is invariably an acute concern. That’s regardless of geography, industry, and identity of respondent (executive, LoB, IT, DevOps, etc.). While the challenge of providing protection and security extends across all pla…
Tetration Micro-Segmentation: Secure Your Applications and Your Seat at the Yankees Game
Application security is top-of-mind for all of our customers. Companies are expanding to the cloud, and with the proliferation of Bring Your Own Device (BYOD) accessing applications, the environment outside of the data center is becoming more difficult to secure. That is why it is imperative that ou…
Cisco Live EMEA 2019 – Barcelona gears up to host industry’s premier tech. event, second year in a row
Barcelona is Europe’s greatest city to visit in the winter. It is also the time when the cultural calendar swings into action, and often hosts the best exhibitions of the year. For me, the special draw is Cisco Live Barcelona, where I get the opportunity to meet, learn and collaborate with industr…
Cisco Tetration Deep Dive Demos: Features Walkthrough
Watch below to learn how to use the most popular features in Cisco Tetration. Bookmark this page because new videos will be added. Demo: Introduction to Cisco Tetration User Interface (UI) Demo: How to Set Up Users and Roles in Cisco Tetration Demo…
Securing Hybrid Cloud Workloads with the Expanded Cisco Tetration Platform
In the recently released Cisco 2018 Annual Cybersecurity Report, 2017 saw growth in malware targeted at ransom or profit motives, but also the destruction of systems and data. Malware continues to get more sophisticated and is now able to elude sophisticated sandboxing environments. Encryption cont…
Data Center Application Layer Attacks
There have been a number of articles written on data center outages and their business costs of lost productivity, infrastructure damage, loss of brand reputation and goodwill in the marketplace, and litigation costs. Data center outages can occur from a number of factors such as such as component…
The Dreaded “5-Tuple”
If you were to ask any security administrator who had to manage the security policies across an organization, they would probably define the “5-Tuple” as a “hard to understand, cryptic method leftover from the 1990s’ policy management for implementing access control and segmentation capabilities in…
5 Areas of ROI on Data Center Security
As data center operations managers and business owners analyze their budgets to uncover economic headwinds, the importance of deriving ROI from each purchase and initiative is considered. To better understand the costs and benefits of the Cisco Secure Data Center Solution, we engaged with analyst fi…
Three Imperatives for Today’s CISO for Data Center Security : Why you should attend our upcoming Webcast on July 16
The data center landscape is undergoing remarkable transformation and security is being forced to evolve as organizations embrace more dynamic services. For instance, Gartner predicts 17.9% CAGR in cloud services usage through 2016. As such, Chief Information Security Officers (CISOs) will need to c…