TrustSec

September 8, 2017

HEALTHCARE

Understanding Medical Device Security

­­The FDA recall of a medical device last week has caused a bit of a media storm as the general public scrambles to find out more. The fact that a medical device meant to help sustain life is insecure and could be hacked to kill a patient is alarming to all of us. More worrying is that the medical d…

June 23, 2017

TECHWISETV

What is an Intuitive Network?

It can be easy to get lost in all the superlatives of these recent announcements…they can border on hyperbole.  It is important to remember that much of the recent Intuitive Network, New Era of Networking announcement is purposefully taking the long view.  DO NOT miss the fact that there is a…

March 17, 2017

HEALTHCARE

Addressing Healthcare Security Challenges

It’s a gross understatement to say that security is critical in healthcare, where a breach can not only impact an organization’s effectiveness and reputation but also affect patient privacy and—worst-case scenario—health and safety. If you are reading this blog, you no doubt already know the most co…

February 21, 2017

NETWORKING

Enterprise Network Security: Is it in your DNA?

If you were driving a race car without brakes, chances are you’d keep your speed in check. How else could you manage the corners? Pushing the pedal-to-the-metal on the straightaways and actually reaching the car’s peak performance would only end poorly when the road turns. The same can be said for e…

January 24, 2017

SECURITY

Visibility is the new perimeter; It’s time for Cisco ISE 2.2

Visibility doesn’t just mean seeing data move within the network – it also means seeing who and what is on the network. Trends like the Internet of Things (IoT) and Enterprise Mobility – that will result in tens of billions of connected devices and users – are fundamentally changing the enterprise n…

December 19, 2016

SECURITY

To be Effective, Security Needs to Be a Force Multiplier

Effective security is simple, open, and automated.  We’ve already talked about simple and open. Now let’s talk about automated. Security admins can relate to this scenario. You just learned of an infected system in your environment of thousands of devices. How many others are affected? That’s hard t…

September 26, 2016

SECURITY

2016 Forrester TEI Study Shows TrustSec Cuts Operations Costs up to 80%

Forrester Consulting recently conducted an analysis of customers using TrustSec software-defined segmentation in production networks and deduced the following: This matters today as network segmentation in the branch, campus and data center is a critical foundation for any network defense. Effectiv…

August 4, 2016

SECURITY

Seeing Over the Wall: Unified TrustSec-ACI Policy Monitoring with Stealthwatch and ISE v2.1

Visibility has always been a core component of building effective security policy. Starting with the discovery phase of understanding the behavior of the users and assets on a network through the effective monitoring of the policy once the policy is implemented. Through the collection and analysis o…

July 7, 2016

SECURITY

What do “Going Green” and policy group sharing have in common? More than you think!

New Cisco Identity Services Engine (ISE) v2.1 Enables TrustSec-ACI Policy Plane Integration “Going green” is all about reducing waste and protecting the environment. It’s a movement most of us believe in and try to live by. Who wouldn’t want to reduce waste and protect the environment? In fact, it g…