Building network and workload security architectures can be a daunting task. It involves not only choosing the right solution with the appropriate set of capabilities, but also ensuring that the solutions offer the right level of resilience. Resilience is often considered a network function, where the network must be robust enough to handle failures and offer alternate paths … [Read more...] about Building a Resilient Network and Workload Security Architecture from the Ground Up
workload
Protecting Against regreSSHion with Secure Workload
On July 1, 2024, the Qualys Threat Research Unit (TRU) disclosed an unauthenticated, remote code execution vulnerability that affects the OpenSSH server (sshd) in glibc-based Linux systems. [For more information visit Qualys Security Advisory and our Cisco Security Advisory on regreSSHion (July 2024).] Now we have seen how CVE-2024-6387 has taken the internet by storm, making … [Read more...] about Protecting Against regreSSHion with Secure Workload
Stay Compliant: Cisco Secure Workload Introduces State-of-the-art, Persona-based Reporting
Workload security tools draw the attention of diverse cohorts, united by a mission: fortifying hybrid cloud workloads. In a market filled with disparate tools, Secure Workload offers a tailored reporting solution that revolutionizes how SecOps, Network Administrators, and CxOs interact with their workload security solution. A New Era of Informed Decision Making Traditional … [Read more...] about Stay Compliant: Cisco Secure Workload Introduces State-of-the-art, Persona-based Reporting
Navigating DORA (Digital Operational Resilience Act) with Secure Workload
Over the past decade, the cyber threat landscape has undergone a significant transformation, escalating from isolated attacks by lone wolves to sophisticated, coordinated breaches by state-sponsored entities and organized crime groups. During this period of change, cybersecurity has often been a secondary thought for enterprises, frequently addressed through reactive measures … [Read more...] about Navigating DORA (Digital Operational Resilience Act) with Secure Workload
Cisco Secure Workload: Policy-as-Code Is a Win-Win
The last few years have proved to be a catalyst for digital transformation for many of our enterprise customers. Application modernization and adopting multicloud are the foundational building blocks for digitizing business. Customers employ CI/CD (continuous integration, continuous delivery) to modernize their applications, building them on a cloud infrastructure. This … [Read more...] about Cisco Secure Workload: Policy-as-Code Is a Win-Win
Forrester Wave Names CrowdStrike Strong Performer For Cloud Workload Security
“In its current CWS offering, the vendor has great CSPM capabilities for Azure, including detecting overprivileged admins and enforcing storage least privilege and encryption, virtual machine, and network policy controls.” – The Forrester Wave™: Cloud Workload Security, Q1 2022 CrowdStrike is excited to announce we have been named a “Strong Performer” in The Forrester Wave:™ … [Read more...] about Forrester Wave Names CrowdStrike Strong Performer For Cloud Workload Security
4 Keys to Selecting a Cloud Workload Protection Platform
Security budgets are not infinite. Every dollar spent must produce a return on investment (ROI) in the form of better detection or prevention. Getting the highest ROI for security purchases is a key consideration for any IT leader. But the path to achieving that goal is not always easy to find. It is tempting for CISOs and CIOs to succumb to “shiny toy” syndrome: to buy the … [Read more...] about 4 Keys to Selecting a Cloud Workload Protection Platform
Achieving Holistic Workload Security with CrowdStrike and Nutanix
With virtualization in the data center and further adoption of cloud infrastructure, it’s no wonder why IT, DevOps and security teams grapple with new and evolving security challenges. An increase in virtualized applications and desktops have caused organizations’ attack surfaces to expand quickly, enabling highly sophisticated attackers to take advantage of the minimal … [Read more...] about Achieving Holistic Workload Security with CrowdStrike and Nutanix
Control Across Your Hybrid Environments Using Cisco Secure Workload 3.6
Business needs are driving significant changes in today’s datacenters. Enterprises are not only migrating applications to the cloud from on-premises data centers, but they are developing multicloud strategies that take advantage of availability, global footprint, and cost saving structures. In fact, IDC has predicted that more than 90% of IT organizations will commit to … [Read more...] about Control Across Your Hybrid Environments Using Cisco Secure Workload 3.6
Secure Workload Protection: Extending Micro Perimeters and Automation to Enterprise IaaS
This post was authored by Frank Dickson, Program Vice President, Cybersecurity Products, IDC The best kept secret in cloud workload security is that Cisco is number two in revenue market share according to IDC, just shy of $100 million in 2019 and almost certain to exceed $100 million in 2020 (please stay tuned). The reason for the “secret” is that the path that Cisco has taken … [Read more...] about Secure Workload Protection: Extending Micro Perimeters and Automation to Enterprise IaaS