Zero Trust
Zero Trust – 5 Things You Need to Know
The term zero trust is a popular buzzword these days – and rightly so considering that users, devices and clouds are moving outside the traditional network, shifting the perimeter and creating gaps in visibility. If you are a partner in the cybersecurity space you have probably had at least a handfu…
Securing Your Future by Innovating Today
At a time when cybercrime costs three times more than natural disasters globally1, the demands on security are constantly growing. Whether you’re asked to protect a workforce that roams anywhere, a workplace that is digitized, or workloads that run wherever, your disparate security solutions are cre…
Establishing Device Trust to Secure the Workforce
Challenges of Protecting Endpoints With an estimated 70% of breaches starting on endpoints – laptops, workstations, servers, and mobile devices – organizations need visibility into the devices connecting to applications both on the network and in the cloud. Organizations need the abilit…
What’s New & What’s Next with Security at Partner Summit
Our customers are working to build the future and let’s face it – security is a grind. Customers have to deal with increased complexity, multiple vendors, and adversaries who only continue to get more sophisticated. Not to mention the increasing pressure on our partners to stay on top of the lates…
AI Leadership: Securing your place in Artificial Intelligence
Federal agencies are seeking new approaches and technologies to unlock the power of data through artificial intelligence and machine learning (AI/ML). Focusing on the fundamentals can help them empower the real change they seek. And do so during what could otherwise be an intimidating process. So wh…
Putting the ‘C’ in Gartner’s CARTA
As we get ready for the Gartner IT Symposium/Xpo in Orlando, we’ve been thinking more about every element and imperative in their CARTA model: Continuous Adaptive Risk and Trust Assessment. Since ‘C’ also stands for Cisco, let’s start there. Gartner uses the word “continuous” in a lot of places, inc…
One Security Framework to Address Zero Trust, NIST, CARTA, CDM, and HVA
Well, the industry now understands where Cisco is going! A modern security framework/architecture should be designed to cover all the important security frameworks and compliance requirements. Cisco has been developing a comprehensive end to end, cross-domain network architectural approach over the…
Ingredients Needed to Manage Network Tribbles
Cybersecurity – the final frontier, these are the trials and tribulations that network admins face on an ongoing basis. Sometimes it feels like network admins are Starfleet captains navigating unknown galaxies as the infrastructure of organizations become more complex. Using a complicated mix of cl…
Zero Trust for Government Networks: 6 Steps You Need to Know
Government agencies are well along on their journey of Digital Transformation to fundamentally change the way they manage and deliver services throughout our country and to citizens. They are doing this by thinking differently about how they use their networks and taking advantage of new technologie…