Accelerate Application Deployment Across Cisco ACI Fabric, On-Premise Firewalls and Cloud Security Controls

Jonathan Gold-Shalev
Product Manager

Deployment of business applications is becoming more agile by the day. Organizations are rapidly adopting SDN solutions, such as Cisco ACI, to reduce provisioning time.

Learn how you can seamlessly integrate and extend network and security policy automation for Cisco ACI to all security devices across the enterprise network, inside the data center, at its edges and in the cloud.

Join Jonathan Gold Shalev, Senior Product Manager, to understand how to harness the power of Cisco ACI with a holistic, business-driven, security-management approach covering all the organization’s network security controls.

Join this webinar to understand how you can:

Relevant Resources
A 3 Layered Approach to Application Migration

A 3 Layered Approach to Application Migration

There are many processes involved in migrating applications to the cloud, however network security is often neglected. When this happens, applications are deployed in the cloud with inadequate security and compliance measures in place, or conversely the security team steps in and halts the migration process. This white paper presents a structural approach for bridging this network security gap before and during the process of migrating applications, that gives security team the essential groundwork needed to prepare for a secure migration process to the cloud.


Firewall rule recertification: Challenges and benefits

Firewall rule recertification: Challenges and benefits

As part of your organization’s security policy management best practices, firewall rules need to be reviewed and recertified regularly to ensure security, compliance and optimal firewall performance. Firewall rules that are out of date, unused or unnecessary should be removed, as firewall bloat creates gaps in your security posture, causes compliance violations, and impacts firewall performance. In the past, firewall rule recertification was often performed manually; an error-prone and time-consuming process. The new application-centric approach to firewall recertification offers an efficient, effective and automated method of recertifying firewall rules.