Thursday, February 9, 2023
LetsAskBinu.com
  • Home
  • Cybersecurity
  • Cyber Threats
  • Hacking
  • Protection
  • Networking
  • Malware
  • Fintech
  • Internet Of Things
No Result
View All Result
LetsAskBinu.com
No Result
View All Result
Home Networking

Cisco Innovations Create a More Secure and Scalable SD-WAN Fabric

Researcher by Researcher
November 1, 2022
in Networking
0
Cisco Innovations Create a More Secure and Scalable SD-WAN Fabric
189
SHARES
1.5k
VIEWS
Share on FacebookShare on Twitter


One important lesson the pandemic taught us is that enterprises need a network infrastructure to support a hybrid workforce with a distributed application landscape. In a hybrid workplace environment, people need to be able to work fluidly from remote home offices as well as from established branch and campus office spaces. In these dynamic workplace environments, IT needs to ensure that specific workers or work groups are subjected to the correct security policy controls, regardless of the connection location, so they can use the applications that they are entitled to access. With our most recent innovations and integrations, Cisco’s SD-WAN fabric is ready to support IT’s security needs while ensuring optimal application experiences for the hybrid workforce as well as customers and partners.

The Cisco SD-WAN secure fabric has evolved in multiple directions to address hybrid workforce by:

Related articles

Massive ransomware operation targets VMware ESXi

Massive ransomware operation targets VMware ESXi

February 8, 2023
Harmonizing Networking and Security to Make SASE Easy

Harmonizing Networking and Security to Make SASE Easy

February 7, 2023
  • Bringing identity awareness with Cisco Identity Services Engine (ISE) into the SD-WAN fabric to authenticate people and devices as they access networked resources,
  • Extending the network security fabric to remote home offices and workspaces,
  • Detecting advanced persistent threats through integrations with Cisco Secure Network Analytics.

Integration with Cisco Identity Services Engine

Cisco’s Identity Services Engine (ISE) is the state-of-the-art network access control (NAC) solution for managing all types of endpoints. It provides people and devices with secure access to network resources with a zero-trust architecture. Cisco ISE serves as a policy decision point by performing authentication and authorization of the people and devices connecting to the network. To enable authentication, ISE integrates with identity providers such as Active Directory. Cisco’s SD-WAN vManage integrates with ISE to enable IT to configure security policies based on users and user groups connecting to the SD-WAN fabric. IT can apply comprehensive security capabilities—such as application firewall, anti-malware protection, intrusion prevention, and URL filtering—throughout the SD-WAN fabric to a specific user or user group anywhere in the enterprise campus to remote locations. (Refer to Fig.1)

Identity Integration with SD-WAN Security
Figure 1 – Identity Integration with SD-WAN Security

Consider a scenario in a university where the network administrator would like to limit access to social media sites for students—but then make an exception for a specific user group in recruiting for social outreach purposes. Access policies can now be configured on Cisco vManage through user and user-group-based URL filtering.

Connecting and Protecting the Home Office

Cisco’s Catalyst Wireless Gateway platform enables the remote home office workforce to seamlessly connect to the secure SD-WAN fabric. Remote workers connect locally to a Catalyst Wireless Gateway at home and authenticate network access permissions via Cisco ISE. The IPSec tunnels that originate from Catalyst Wireless Gateways are terminated on an SD-WAN branch router. This enables the user and user-group-based policies to be applied from the Cisco ISE Policy Server to remote home-based workforces, thereby extending the scope of the identity-based secure fabric. (Refer to Fig 2)

 Identity integration for Remote Users using Catalyst Wireless Gateway
Figure 2 – Identity integration for Remote Users using Catalyst Wireless Gateway

Securing Enterprise Branches with Cisco Secure Cloud Analytics

From a security perspective, enterprise branches employing direct internet and multi-cloud access connections are particularly susceptible to breaches that are signatureless and able to exploit vulnerabilities, compromise credentials, and access encrypted communications. These behaviors can occur weeks to months before a file-based threat is injected and can continue to occur even after the breach as the threats move laterally east-west to target corporate assets.

Cisco vManage can now export Flexible NetFlow (FNF) records to the Cisco Telemetry Broker. This enables Cisco Secure Cloud Analytics to detect behavioral threats associated with credential theft, insider threats, consequences of misconfigurations, signatureless day-zero exploits, and encrypted threats. These new integrations with Cisco vManage enable IT to:

  • Maintain network visibility and reporting on hybrid/multi-cloud and on-prem networks;
  • Enable protection against Advanced Persistent Threats such as workload vulnerabilities, data exfiltration, privilege escalation, stolen credentials, and encrypted threats;
  • Enable faster identification of threats and indicators of compromise;
  • Provide policy verification;
  • Identify vulnerabilities due to misconfigurations.
Cisco vManage Exports Flexible NetFlow (FNF) records to Cisco Secure Cloud Analytics
Figure 3 – Cisco vManage Exports Flexible NetFlow (FNF) records to Cisco Secure Cloud Analytics

A More Secure SD-WAN Fabric from Campus to Home

The Cisco SD-WAN fabric has increased its scope to include securing the remote workforce with new integrations with Cisco ISE and Cisco Secure Cloud Analytics.  Now IT can extend access and security policies across the enterprise campus to branches and remote workers at home—wherever people need to connect to the SD-WAN fabric.

 

Learn more about Cisco ISE

Additional Resources:

Cisco Remote Workforce Network Solution Overview

Get curated content from Networking experts at the Networking Experiences Content Hub

Share:



Source link

Tags: CiscoCreateFabricinnovationsScalableSDWANsecure
Share76Tweet47

Related Posts

Massive ransomware operation targets VMware ESXi

Massive ransomware operation targets VMware ESXi

February 8, 2023
0

These ransomware infections on VMware ESXi software are due to a vulnerability that has existed since 2021. Find out the...

Harmonizing Networking and Security to Make SASE Easy

Harmonizing Networking and Security to Make SASE Easy

February 7, 2023
0

In an era where the experience is everything, digital transformation can be hard for IT organizations, creating increased operational complexity....

Cisco Catalyst 9200CX now orderable!

New Cisco Catalyst 9200CX Compact With HVDC, Cisco UPOE And mGig

February 6, 2023
0

Figure 1. Cisco Live Amsterdam 2023 Make sure your network is ready for a hybrid world where the workplace is...

Cisco Catalyst 9000 Core Switches: Don’t Let Your Core Stop Turning

Cisco Catalyst 9000 Core Switches: Don’t Let Your Core Stop Turning

February 2, 2023
0

There have been a lot of talks recently about the article entitled “Multidecadal variation of the Earth’s inner-core rotation”. The...

Attend Cisco Live: Build Unified Experiences Using Simplicity And Data Intelligence

Attend Cisco Live: Build Unified Experiences Using Simplicity And Data Intelligence

February 1, 2023
0

I’m excited to pack my bags to attend Cisco Live EMEA in Amsterdam next week! After a three-year hiatus, two words...

Load More
  • Trending
  • Comments
  • Latest
This Week in Fintech: TFT Bi-Weekly News Roundup 08/02

This Week in Fintech: TFT Bi-Weekly News Roundup 15/03

March 15, 2022
QNAP Escalation Vulnerability Let Attackers Gain Administrator Privileges

QNAP Escalation Vulnerability Let Attackers Gain Administrator Privileges

March 15, 2022
Supply chain efficiency starts with securing port operations

Supply chain efficiency starts with securing port operations

March 15, 2022
A first look at threat intelligence and threat hunting tools

A first look at threat intelligence and threat hunting tools

March 15, 2022
Beware! Facebook accounts being hijacked via Messenger prize phishing chats

Beware! Facebook accounts being hijacked via Messenger prize phishing chats

0
Shoulder surfing: Watch out for eagle‑eyed snoopers peeking at your phone

Shoulder surfing: Watch out for eagle‑eyed snoopers peeking at your phone

0
Remote work causing security issues for system and IT administrators

Remote work causing security issues for system and IT administrators

0
Elementor WordPress plugin has a gaping security hole – update now – Naked Security

Elementor WordPress plugin has a gaping security hole – update now – Naked Security

0
Google’s AI Chatbot Is Out To Rival ChatGPT

Google’s AI Chatbot Is Out To Rival ChatGPT

February 9, 2023
New cybersecurity data reveals persistent social engineering vulnerabilities

New cybersecurity data reveals persistent social engineering vulnerabilities

February 9, 2023
New ToddyCat APT Targets Exchange Servers

Fortra Patches Actively Exploited Zero Day in GoAnywhere MFT

February 8, 2023
“Fintech Right Now is a Boys Club” – How to Close the Gender Gap in Fintech with Stax

Spotlight: How the Isle of Man Became an Insurtech Hub

February 8, 2023

Recent Posts

Google’s AI Chatbot Is Out To Rival ChatGPT

Google’s AI Chatbot Is Out To Rival ChatGPT

February 9, 2023
New cybersecurity data reveals persistent social engineering vulnerabilities

New cybersecurity data reveals persistent social engineering vulnerabilities

February 9, 2023
New ToddyCat APT Targets Exchange Servers

Fortra Patches Actively Exploited Zero Day in GoAnywhere MFT

February 8, 2023

Categories

  • Cyber Threats
  • Cybersecurity
  • Fintech
  • Hacking
  • Internet Of Things
  • Malware
  • Networking
  • Protection

Tags

Access attack Attacks banking BiWeekly bug Cisco cloud code critical Cybersecurity Data Digital exploited financial Fintech Flaw flaws Google Group Hackers Krebs Latest launches malware Microsoft million Network News open patches Payments platform Ransomware RoundUp security Software Stories TFT Threat Top vulnerabilities vulnerability warns Week

© 2022 Lets Ask Binu All Rights Reserved

No Result
View All Result
  • Home
  • Cybersecurity
  • Cyber Threats
  • Hacking
  • Protection
  • Networking
  • Malware
  • Fintech
  • Internet Of Things

© 2022 Lets Ask Binu All Rights Reserved