Inscrivez-vous maintenant pour un meilleur devis personnalisé!

Using Tetration for Application Security and Policy Enforcement

Jan, 11, 2019 Hi-network.com

This blog contributed byJoel W. King. Joel works at World Wide Technology, a Cisco Gold Certified Partner and Learning Partner Specializedwith Master Specializations in cloud, security, and unified communications. Contact Joel or WWT. 

 


 

Protecting assets requires a Defense in Depth approach

Protecting assets within the enterprise requires the network manager to adopt automated methods of implementing policy on endpoints. A defense in depth approach, applying a consistent policy to the traditional firewall as well as policy enforcement on the host, takes a systemic view of the network.

Value added resellers are increasingly helping customers deploy solutions comprised of vendor hardware and software, support for open source software, and developing code which integrates these components. A great example of this, and the subject of this blog, is World Wide Technology making its integration with Ansible Tower and Cisco Tetration available as open source through Cisco DevNet Code Exchange.

I started my career in programming and analysis and systems administration, transitioned to network engineering, and now the projects I find most interesting require a combination of all those skills. Network engineers must view the network in a much broader scope, a software system that generates telemetry, analyzes it, and uses automation to implement policy to secure applications and endpoints.

The theme for Networkers/CiscoLive 1995 was

tag-icon Tags chauds: En vedette tetration DevNet Code Exchange

Copyright © 2014-2024 Hi-Network.com | HAILIAN TECHNOLOGY CO., LIMITED | All Rights Reserved.