Virtualization Featured Article


Cisco Brings New Capabilities to Tetration


March 08, 2018

Businesses are using connected technologies at a large and growing rate.

They’re moving workloads to the cloud. Actually, not just the cloud – multiple clouds. Some workloads might be a better match for Amazon Web Services, for example, and some for Microsoft Azure. And, in the multicloud world, businesses have the option to pick and choose among different cloud service providers.

Of course, the more connectivity and cloud solutions business employ, the more they put themselves at risk of cyberattack. That’s something they need to address.

Plus, container-based workloads, and microservices and virtualized architectures, create more moving pieces. That – and the fact that businesses are employing multicloud strategies – makes it difficult to know where everything is, how it’s performing, and whether it’s safe.

So, Cisco is addressing all that by introducing new security capabilities to its Tetration platform. New features include:

• Application segmentation using whitelist that enables zero-trust

• Baselining process behavior and identifying deviations

• Identification of software vulnerabilities and exposures, and 

• Monitoring processes running on servers in real-time

That helps organizations implement consistent workload protection policies. Yogesh Kaushik recently shared this attaches the security policy to the workload – a practice known as microsegmentation. That means that as the workload moves, the policy moves with it.

And Cisco Tetration enables organizations to fine-tune their policies over time based on what’s happening with their workloads and trends it helps uncover.

The system collects more than 100 attributes from thousands of workloads, infrastructure (including the network, load balancers, AWS), orchestration systems, and other systems of record in real-time, the company explains.

“This includes metadata about every process, every software package, and every flow/packet to name a few,” Cisco explains. “Based on these attributes, Tetration maps out all application components and dependencies in a zero-knowledge environment using unsupervised machine learning. Think of this as a fingerprint of your application, based on behavior such as what’s running on the workloads, who they talk to, how often, when, and in what pattern.”




Edited by Mandi Nowitz









Click here to share your opinion – Would color of equipment influence your purchasing decision, one way or another?





Featured Blog Entries

Day 4, Cisco Live! - The Wrap

Day 4 was the final day of our first ever Cisco Live! We had a great show, with many great conversations and new connections with existing and potential end users, resellers, partners and job hunters.

Day 3, Cisco Live!

Day 3 of Cisco Live is history! For Fiber Mountain, we continued to enjoy visits from decision makers and influencers who were eager to share their data center and structured cabling challenges.

Day 2, Cisco Live!

Tuesday was Day 2 of Cisco Live for Fiber Mountain and we continued to experience high levels of traffic, with many high value decision makers and influencers visiting our booth. One very interesting difference from most conferences I attend is that there are no titles on anyone's show badges. This allows open conversations without people being pretentious. I think this is a very good idea.

Day 1, Cisco Live!

Fiber Mountain is exhibiting at Cisco Live! In Las Vegas for the first time ever! Our first day was hugely successful from just about any perspective - from quantity and quality of booth visitors to successful meetings with customers.

Industry News