How Cisco Uses the Isovalent Platform to Secure Cloud Workloads

How Cisco Uses the Isovalent Platform to Secure Cloud Workloads

As cloud environment evolve, efficient and effective workload security has been at the top of the list. At Cisco, we have integrated the Isovalent platform into our infrastructure to ensure our cloud workloads are protected without compromising on performance. Why Isovalent? The Isovalent platform is based on the eBPF (extended Berkeley Packet Filter) technology that offers a very modern approach to securing cloud-native environments. Where traditional security solutions usually fail to keep up with the…

Read More

How Cisco Uses the Isovalent Platform to Secure Cloud Workloads

How Cisco Uses the Isovalent Platform to Secure Cloud Workloads

As cloud environment evolve, efficient and effective workload security has been at the top of the list. At Cisco, we have integrated the Isovalent platform into our infrastructure to ensure our cloud workloads are protected without compromising on performance. Why Isovalent? The Isovalent platform is based on the eBPF (extended Berkeley Packet Filter) technology that offers a very modern approach to securing cloud-native environments. Where traditional security solutions usually fail to keep up with the…

Read More

3 tips to help bridge the gap between identity and security teams

3 tips to help bridge the gap between identity and security teams

Every year, we see the lines continue to blur between IT, operations and security teams, with many functions traditionally sitting with the CIO that may be better suited with the CISO — or at least need a dotted line to the security team. One such function is identity. Identity and Access Management traditionally manages access to systems, databases, devices, the cloud, SASS applications, remote access, multi-factor authentication (MFA) and account privileges rather than focusing on…

Read More

4 ways to innovate enterprise cybersecurity

4 ways to innovate enterprise cybersecurity

4 ways to innovate enterprise cybersecurity | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses CookiesBy…

Read More

Identity management conference to take place April 12

Identity management conference to take place April 12

Identity management conference to take place April 12 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website…

Read More

How to choose the right access control system

How to choose the right access control system

How to choose the right access control system | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website…

Read More

Business travel likely to remain low permanently

Business travel likely to remain low permanently

Business travel likely to remain low permanently | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses…

Read More

Business travel likely to remain permanently low

Business travel likely to remain low permanently

Business travel likely to remain permanently low | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses…

Read More