Cisco Zero Trust in Action: Apply micro-segmentation at scale

Channel:
Subscribers:
342,000
Published on ● Video Link: https://www.youtube.com/watch?v=sWGp5lhmJCs



Duration: 5:37
162 views
6


This product demo shows how Secure Workload uses vulnerability data to enforce trusted access via micro-segmentation policies. Quite simply, if an app is vulnerable, the policy engine will automatically limit access to it until it can be remediated.

Zero Trust with Cisco: https://www.cisco.com/go/zero-trust




Other Videos By Cisco


2023-02-09Migrate Nutella Boxes from Viptela OS to Cisco IOS XE
2023-02-09Secure Education
2023-02-09Helping digitalization by implementing Cisco DNA Center
2023-02-09Cisco Live 2023 Amsterdam: LIVE Broadcast - Day 3 #CiscoLiveEMEA - PM Sessions
2023-02-09Collect Logs From UCS Manager, UCS B-Series and UCS C-series
2023-02-09Cisco Live 2023 Amsterdam: LIVE Broadcast - Day 3 #CiscoLiveEMEA - AM Sessions
2023-02-08Cisco Zero Trust in Action: Secure user access to applications
2023-02-08Zero Trust in Action: Automate and orchestrate security workflows
2023-02-08Cisco Zero Trust in Action: Unify access policy across networks and clouds
2023-02-08Delivering Connectivity throughout Denmark with Norlys
2023-02-08Cisco Zero Trust in Action: Apply micro-segmentation at scale
2023-02-08Cisco Catalyst IE3100 Rugged Series Switches Product Demo Video
2023-02-08#CiscoChat Live: Simplifying IT to Transform the Experience
2023-02-08Cisco Optics Podcast Ep 35. Fascinating laser research projects you wish you thought of (1 of 9)
2023-02-08Cisco Live 2023 Amsterdam: LIVE Broadcast - Day 2 #CiscoLiveEMEA
2023-02-07Meet Catalyst IW9165E Rugged - Cisco's first dedicated wireless client
2023-02-07Catalyst IW9165E Rugged Wireless Client Demo – an in-depth look
2023-02-07Bring Simplicity, Flexibility, and Security to the IoT Edge
2023-02-07Cisco Industrial Switching Portfolio Overview
2023-02-07Cisco Cyber Vision in IoT Operations Dashboard Demo
2023-02-07Cisco IoT Operations Dashboard with Secure Equipment Access



Tags:
cloud
microsegmentation
portal
products
security
technology
workload security
zero trust
zero trust security