Cisco technologies allow for automated inventory of all ICT resources connected to the network, including applications, users and data, and then perform their detailed segmentation, which simplifies attack detection and localization of their spread. Today, according to Alexey Lukatsky, using Cisco technologies, without installing any additional agents on devices, solely based on the results of traffic analysis, it is possible to identify more than a million different devices connected to the network.
Other devices can be profiled based on the context of their behavior on the network (who, what, where, where from, when, on behalf of which user or application connects), data on which is collected bolivia whatsapp data network devices. The same data simplifies the development of rules for interaction of entities on the network. The use of role-based management of their interaction significantly simplifies the control of entity behavior. Labels that are attached to network traffic by Cisco product.
Based on the results of identification, classification, belonging to a particular group, and behavior analysis, follow it along the entire route and allow the necessary information security rules to be applied to it. If a deviation from these rules is detected, the network can independently make decisions about blocking the offending traffic. Alexey Lukatsky emphasizes that Cisco technologies aimed at ensuring cybersecurity work with equipment not only from Cisco, but also from other vendors.
From the first days of the new year
-
- Posts: 398
- Joined: Tue Dec 03, 2024 10:15 am