GenAI to Advanced Microsegmentation: Secure Workload 3.10 Has It All!


In recent years, cyberattacks have become more sophisticated and pervasive, easily outpacing traditional security measures like perimeter firewalls. This shift has highlighted the critical need for advanced security strategies. Microsegmentation has emerged as a game-changing approach, enabling robust protection across customers’ increasingly complex networks, which now span data centers, branch offices, remote campuses and public clouds.

The platform for microsegmentation has taken a significant leap forward with the launch of its 3.10 release earlier this month. Designed to deliver a seamless admin experience, the new release embraces GenAI to accelerate time-to-value for customers. Packed with powerful features, it offers extended agent support for legacy operating systems like Solaris 10 and various Linux distributions, as well as IP filters for IBM AIX OS agent support for legacy operating systems like Solaris 10 and various Linux distributions, as well as IP filters for IBM AIX OS.

For Kubernetes and OpenShift users, the release brings exciting updates, including support for OVN network deployments, qualification of RHEL 8 as a worker node and compatibility with the latest K8s (1.31) and OpenShift (4.16) versions. Furthermore, Secure Workload reaffirms its infrastructure-agnostic approach by enabling seamless coexistence of its agent with customer’s choice of service mesh and ingress controller in their Kubernetes deployment. This release underscores Secure Workload’s commitment to delivering cutting-edge innovation and flexibility to meet evolving customer needs.

Harnessing eBPF: Elevating Secure Workload visibility and efficiency

As part of its commitment to scalability and resilience, the Secure Workload 3.10 release introduces a major innovation by replacing the traditional “libpcap” method with the cutting-edge eBPF technology. This enhancement allows the agent to capture flow, process, package (Software Bill of Material), and vulnerability telemetry directly from workloads using eBPF on supported OS kernel versions.

The shift to eBPF not only enhances data collection accuracy but also reduces agent resource consumption by over 10%. With these improvements, organizations can achieve complete visibility into their workloads while maintaining optimal system performance. This advancement marks a significant step forward in delivering robust, efficient, and scalable workload security.

Secure Workload Agent architecture 

From task-centric to outcome-centric: Unlocking GenAI with Secure Workload 3.10

The Secure Workload 3.10 release takes a bold step forward by integrating GenAI, transforming the platform from task-focused to outcome-driven. By automating mundane administrative tasks, GenAI revolutionizes policy management and compliance workflows. It identifies unused, shadowed or overly broad policies and recommends corrections or removals, eliminating the reliance on manual processes (goodbye, nested Excel sheets!).

Graphic AI Assistant
Secure Workload AI Assistant

Previously, administrators faced multiple steps to discover new policies or address escape flows identified during policy analysis. The new AI assistant simplifies this by detecting policy updates caused by application behavior changes or seasonality and presenting them with supporting evidence. Additionally, it recommends precise actions — whether to allow or block an escaped flow — based on concrete proof.

This innovation not only simplifies compliance and policy management but also multiplies administrator productivity while dramatically improving their experience. Secure Workload 3.10 sets the stage for Gen AI to become a powerful ally in modern security operations.

One of the standout innovations in the Secure Workload 3.10 release is the Identity Connector — a unified solution for integrating diverse identity sources such as Active Directory, Open LDAP, Azure AD, ISE and AnyConnect. This powerful feature enables user identity-based segmentation, providing unparalleled visibility by mapping users to their respective flows. With Identity Connector, organizations can achieve greater security granularity and streamline identity-driven policies across their environments.

Experience the power of Global Visualization, an intuitive dashboard that seamlessly showcases flows, policies, vulnerabilities, and more across your entire enterprise application landscape in the Secure Workload 3.10 release. Designed to provide a clear, at-a-glance view of your security posture, it delivers actionable intelligence that empowers you to make informed decisions quickly. Coupled with a magnetic UI, Global Visualization elevates the user experience to new heights, delivering clarity and control that redefines how enterprises manage and secure their application environments.


We’d love to hear what you think. Ask a Question, Comment Below, and Stay Connected with Cisco Secure on social!

Cisco Security Social Channels

Instagram
Facebook
Twitter
LinkedIn

Share:





Source link

Leave a Comment