|
This video is part of the appearance, “Cisco Presents at Security Field Day 4“. It was recorded as part of Security Field Day 4 at 13:00-15:00 on October 21, 2020.
Watch on YouTube
Watch on Vimeo
Now that we know what to do and what we want to secure our applications, where do we start? Do you know how your applications are dependent and communicating in your environment? How can you identify all the logical boundaries and connectivity to define & implement your segmentation & security policy? Even if you did figure that out, how do you keep them current and where do you enforce them?
Come join us in this section to learn how Tetration discovers the policy automatically, in your dynamic environment. How can it help keep your policies current & up to date, how does it ‘follow’ your application workload.
Once we discover the policy, we will also walk through where and how to enforce it in your environment to keep all your workloads secure, everywhere.
Personnel: Tim Garner