Segmentation

Cisco Cyber Vision: Under the hood

It’s an exciting time for organizations that are migrating to Industry 4.0. Over the last few decades, industrial control systems (ICS) have enabled modern industrial automation. Today, Industrial Internet of Things (IIoT) technologies present new opportunities to increase operational efficien…

January 10, 2020

SECURITY

Datacenter Security: How to Balance Business Agility with Great Protection

When IDC consults with enterprise customers or performs worldwide surveys, security is invariably an acute concern. That’s regardless of geography, industry, and identity of respondent (executive, LoB, IT, DevOps, etc.). While the challenge of providing protection and security extends across all pla…

December 18, 2019

NETWORKING

Enterprise Networking in 2020: 5 Trends to Watch in Wireless, SD-WAN, More

Networking isn’t what it used to be. A few years ago, the epicenter of networking began to move. It shifted from company-owned datacenters, out to the cloud. For users, the focus of networking moved from computers connected with wires, to mobile devices connected over the air. These fundamental shif…

September 25, 2019

SECURITY

The Criticality of the Network in Securing IoT and Critical Infrastructure

Security is the key to the success of any digital project, whether you are connecting critical infrastructure, industrial Internet of Things (IoT), or delivering data and telemetry to reduce costs and increase revenue. We have long advocated the need for a holistic approach to IoT security, and with…

September 10, 2019

NETWORKING

Business Benefits of Segmentation with Software-Defined Access

The goal of moving applications to the cloud and integrating with SaaS platforms is to satisfy the growing demand for connectivity to data resources and applications at any time, from anywhere. However, achieving that goal with high levels of Quality of Experience (QoE) for applications depends on t…

January 29, 2019

SECURITY

It’s 9am. Do you know where your data is?

‘Data center anywhere’ requires security everywhere It’s 9am. Do you know where your data is? If you’re like most businesses today, it’s everywhere. Your data center is no longer a physical place – it’s wherever your data is – on-premises, in SaaS-based applications, and in public clouds. In fact, G…

January 8, 2019

SECURITY

Moving Towards The Zero Trust Cybersecurity Framework – A Practical Approach

The original Zero Trust model was conceived by Forrester, and leveraged by Google as part of their BeyondCorp initiative. Gartner has their framework called Continuous Adaptive Risk and Trust Assessment (aka. CARTA). These trust-centric approaches shift access decisions based on network topology to…

December 4, 2018

SECURITY

Improve network and security operations with Firepower multi-instance and Cisco Threat Response

As one of the largest security companies in the world, we take great pride in building solutions that many thousands of organizations trust to secure their networks. Small businesses and large enterprises alike rely on Cisco firewalls to keep their organizations running. With our latest release, Fir…

September 19, 2018

SECURITY

Automated Policy & Segmentation Violation Alerting with Stealthwatch Cloud

Stealthwatch Cloud is best known for network behavioral anomaly detection and entity modeling, but the level network visibility value it provides far exceeds these two capabilities. The underlying traffic dataset provides an incredibly accurate recording for every network conversation that has trans…