Latest News

Mobilk.net offered in
العربية

Cisco Tetration Analytics Secures Business Applications and Delivers New Deployment Options

Tetration Analytics provides consistent and holistic policy enforcement
2017-02-20 - 09:15 GMT


Mobilk - Cisco announces that Cisco Tetration AnalyticsTM now automates policy enforcement, enabling organizations to build secure environments for their business applications and also expands Tetration with new deployment options. Building on Tetration’s original discovery and visibility capabilities, Cisco’s latest software for Tetration Analytics now provides the industry’s first consistent security policy enforcement applied holistically across each application. Policy is enforced regardless of where the application resides: virtual, bare metal, physical servers, or in private or public clouds, across any vendor’s infrastructure. This new enforcement model binds policies to workload characteristics and behaviors while ensuring that the policy stays intact even as the workload moves. 

“Enterprises worldwide are adopting multi-cloud strategies to realize their objectives for digital transformation, but these present ongoing challenges related to visibility and security. Although 80 percent of security spending is focused on the perimeter, only 20 percent of the breaches occur there. IT organizations are often under siege by a mix of elevated expectations and a rising tide of security threats, not to mention the need to show ongoing improvements in operational efficiencies,” said Osama Al-Zoubi, Chief Technology Officer, Cisco Middle East. “Cisco Tetration Analytics addresses these challenges through pervasive visibility and application segmentation, which is designed to bolster security-policy enforcement across hybrid application environments.”

Complex Applications Challenge Security  

Today’s complex business applications often span hundreds of servers residing on a wide array of heterogeneous infrastructure, both in the data center and in the cloud. This complexity is further compounded by virtualization technologies, application mobility and constant application changes due to modern DevOps environments. As a result, IT managers are challenged to understand an application’s components, their communication pattern and dependencies – all necessary to meet security requirements for modern applications. 

Enhanced Security Through Application Segmentation

Tetration Analytics takes micro-segmentation– a security technique enabling workload separation – a leap further by delivering “application segmentation”, which consistently drives policies across the application layer, regardless of where the application resides: virtualized, bare metal, physical servers, or in the cloud. Policies can be pushed to any vendor’s firewall, and can be orchestrated at the network layer as well. Compared to static legacy solutions, Tetration provides actionable results dynamically based on behavior analysis of billions of flows, processes, and workload characteristics. Consistent policy is enforced through the workload agent for any workload, anywhere.

New Tetration Deployment Options

Cisco is also delivering two new deployment models for Tetration Analytics. In addition to the original large scale platform, Cisco now offers a new smaller-scale platform, Tetration-M, suitable for deployments up to 1,000 workloads. Cisco is also introducing a new cloud appliance with software deployed in the public cloud on Amazon Web Services (AWS), Tetration Cloud – also suitable for deployments up to 1000 workloads. Regardless of the deployment model, Tetration can monitor workloads in private as well as public clouds.

Platform Extensibility Through APIs and Apps 

Tetration Analytics now enables customers and ecosystem partners the ability to write their own applications that access data stored on the platform. Users can bring their own analytics algorithms to Tetration to create apps that generate customized data exports and notifications in open formats specific to their business needs. Cisco is continuing its tradition of open ecosystems by working with partner companies to build applications and integrations with their solutions: AlgoSec, Citrix, Dell EMC, F5, Infoblox, ServiceNow, and Tufin.







    Related News


Reports and Studies

China Telecom Global Limited (CTG), the world-leading provider of integrated telecommunication services, has signed a strategic subsea capacity and..


Reports and Studies

Espoo, Finland – Nokia, Qualcomm Technologies, Inc., and T-Mobile today announced that they have achieved a worlds first showcase of successfully..


Reports and Studies

Steven Yi, President of Huawei Middle East and Central Asia, gave a keynote on the second day of LEAP, Saudi Arabias largest and most comprehensive..

   Comments

Reports and Studies
Latest News

    New Phones


Galaxy Tab S7
Samsung
Mystic Black, Mystic Bronze,
Dual : 13



© 2024 Mobilk.net All rights reserved.
© 2024 Mobilk.net All rights reserved.
Powered By DevelopWay