Security Strategies for a Distributed Workforce
11:38
Description
Related Videos
CIO roundtable hosted by HotTopics discussing how CISOs can manage a hyper-distributed workforce.
View More
View Less
11:38
CIO roundtable hosted by HotTopics discussing how CISOs can manage a hyper-distributed workforce.
This product demo shows how Secure Workload uses vulnerability data to enforce trusted access via micro-segmentation policies. Quite simply, if an app is vulnerable, the policy engine will automatically limit access to it until it can be remediated.
5:36
Listen to this podcast episode to learn how Cisco SD-WAN solutions utilize network analytics and automation to simplify tasks and decrease risks associated with digital infrastructure management.
15:47
This product demo shows a day in the life of a user gaining secure remote access to applications by continuously verifying user and device trust using Cisco zero trust technologies such as Duo and Umbrella.
7:40
This product demo shows how ISE uses Security Group Tags (SGTs) to establish trust and enforce trust-based access based on user type (employee vs. contractor) and then integrates this with the Secure Workload access policy for zero trust security.
7:42
Release 3 of the Cisco YANG Suite tooling includes support for the pip install, it has integrations with Ansible for NETCONF/RESTCONF/gNMI and SNMP-OID to YANG-XPATH migration support.
11:18
Converge wired and wireless. The Cisco Catalyst 9400 Series, including the new Catalyst 9400X model, are modular access switches built for security, flexibility, IoT, and smart buildings.
0:54