micro-segmentation
Tetration Micro-Segmentation: Secure Your Applications and Your Seat at the Yankees Game
Application security is top-of-mind for all of our customers. Companies are expanding to the cloud, and with the proliferation of Bring Your Own Device (BYOD) accessing applications, the environment outside of the data center is becoming more difficult to secure. That is why it is imperative that ou…
Workload protection is a full cycle. Tetration uniquely delivers on it all.
There’s always an inherent challenge between providing a secure infrastructure for your applications and delivering agility. How do you manage a complex web – where apps are dynamic and distributed across your own data center and the cloud – and keep security at the front of your priorities? I…
Micro Segmentation and Cisco ACI – From Theory to Practice Part II
This is Part II in a four part series of blogs. This is the second of a series of blogs where we will illustrate how to leverage Cisco ACI to implement Micro Segmentation. In the first blog we described how to use ACI micro segmentation to implement a web application that uses a tier of apache We…
Micro Segmentation and Cisco ACI – From Theory to Practice
This is Part I in a four part series of blogs. Micro-segmentation has become a buzzword in the networking industry. Leaving the term and the marketing aside, it is easy to understand why customers are interested in the benefits that Micro-segmentation provides. The primary advantage of Micro-segme…
Micro-segmentation: Enhancing Security and Operational Simplicity with Cisco ACI
(This blog has been developed in association with Praveen Jain, VP, Engineering of Cisco’s Application Policy Infrastructure Controller, Juan Lage, Principal Engineer and others) Security is top of mind in today’s data center and cloud deployments and security architectures have continued to e…
3