Have an account?

  •   Personalized content
  •   Your products and support

Need an account?

Create an account

Secure Your Data Center Network

Reduce risk and simplify the adoption and implementation of a modern secure data center network with complete visibility, multilayered segmentation, and threat protection.

Talk to an expert

Business outcomes

Achieve consistency and visibility from data center to cloud

Achieve consistent policies and full visibility of users, devices, networks, applications, workloads, and processes from data center to cloud.

Use segmentation and block-permitting to prevent attackers

Reduce the attack surface and prevent attackers from moving laterally with granular control from the network to the individual application.

Protect against threats

Stop the breach. Quickly detect, block, and respond to attacks before hackers can steal data or disrupt operations.

How CX can help

Simplify network infrastructure and enhance on-premise data and application security

How

  • Deploy application-centric infrastructure (ACI) policies

  • Deploy Tetration and Stealthwatch for workload protection and network traffic analytics

  • Deploy firewalls to further secure workload resources

CX Capabilities Delivered

  • Implemention of block-permit policy model and security segmentation with Cisco ACI and Tetration

  • Enabling of template-based configuration

  • Defining spine/leaf topology and integrate ACI with Cisco Application Policy Infrastructure Controller (APIC)

  • Implementing of Stealthwatch threat detection and segmentation capabilities

Value

  • Increased IT efficiency with simplified network infrastructure and orchestration

  • Achieved workload mobility and flexibility

  • Contained and prevented threats

  • Increased efficiency and self-service with template-based configuration

Define and manage consistent application segmentation policy

How

  • Deploy a simple, consistent policy across multiple on premise and public cloud instances

  • Build a set of IT services in strategic colocation or data center locations

  • Deploy Stealthwatch cloud to extend visibility and threat detection into cloud environments

  • Utilize firewalls, IPS, and anti-malware for threat detection

CX Capabilities Delivered

  • Implemention of ACI anywhere

  • Implemention of Tetration agent in public cloud

  • Deployment of Cisco Stealthwatch cloud capabilities

  • Deploy Cisco Hyperflex

  • Implemention of actionable analytics in Business Critical Services to predict opportunities and preempt risks

Value

  • Achieved consistent network policies across on-premise data centers and public and private clouds

  • Enhanced visibility, segmentation and threat detection across on premise and cloud environments

  • Enhanced end user experience with flexible access to cloud and on-premise resources

  • Increased efficiency via simplified policy management across on-premise, hybrid and multicloud environments

Implement Tetration and AppDynamics

How

  • Implement Cisco Tetration for workload protection and block-permit policy

  • Deploy AppDynamics for application performance monitoring

CX Capabilities Delivered

  • Integration of Cisco Tetration Analytics into production data center environment

  • Definition of Cisco Tetration use cases aligned with business objectives

  • Validation of policies and compliance

  • Implemention of provisioning and segmentation of block-permit policy enablement

  • Implemention of actionable analytics in Business Critical Services to predict opportunities and preempt risks

Value

  • Reduced security risk in the data center by quickly identifying common vulnerabilities and exposures

  • Used application insights to align network policy with business policy requirements

Ensure network security policy and compliance

How

  • Utilize Cisco Network Assurance Engine to proactively verify network-wide behavior and catch dynamic state issues before users experience service degradation

  • Ensure network security policy and compliance

CX Capabilities Delivered

  • Deployment of Cisco Network Assurance Engine

  • Provision of comprehensive monitoring and management through Cisco Managed Services for Data Center and Cloud

  • Implementation of actionable analytics in Business Critical Services to predict opportunities and preempt risks

Value

  • Increased data and application protection by proactively verifying datacenter network state, policy and behavior

  • Reduced or eliminated change-induced errors and outages by predicting the impact of changes

  • Avoided downtime and lost revenue by minimizing human errors and eliminating configuration drift

Simplify network infrastructure and enhance on-premise
data and application security

How

  • Deploy application-centric infrastructure (ACI) and policies

  • Deploy Tetration and Stealthwatch for workload protection and network traffic analytics

  • Deploy firewalls to further secure workload resources

CX Capabilities Delivered

  • Implemention of block-permit policy model and security segmentation with Cisco ACI and Tetration

  • Enabling of template-based configuration

  • Defining spine/leaf topology and integrate ACI with Cisco Application Policy Infrastructure Controller (APIC)

  • Implementing of Stealthwatch threat detection and segmentation capabilities

Value

  • Increased IT efficiency with simplified network infrastructure and orchestration

  • Achieved workload mobility and flexibility

  • Contained and prevented threats

  • Increased efficiency and self-service with template-based configuration

Define and manage consistent application segmentation policy

How

  • Deploy a simple, consistent policy across multiple on premise and public cloud instances

  • Build a set of IT services in strategic colocation or data center locations

  • Deploy Stealthwatch cloud to extend visibility and threat detection into cloud environments

  • Utilize firewalls, IPS, and anti-malware for threat detection

CX Capabilities Delivered

  • Implemention of ACI anywhere

  • Implemention of Tetration agent in public cloud

  • Deployment of Cisco Stealthwatch cloud capabilities

  • Deploy Cisco Hyperflex

  • Implemention of actionable analytics in Business Critical Services to predict opportunities and preempt risks

Value

  • Consistent network policies across on-premise data centers and public and private clouds

  • Enhanced visibility, segmentation and threat detection across on premise and cloud environments

  • Enhanced end user experience with flexible access to cloud and on-premise resources

  • Increased efficiency via simplified policy management across on-premise, hybrid and multicloud environments

Implement Tetration and AppDynamics

How

  • Implement Cisco Tetration for workload protection and block-permit policy

  • Deploy AppDynamics for application performance monitoring

CX Capabilities Delivered

  • Integration of Cisco Tetration Analytics into production data center environment

  • Definition of Cisco Tetration use cases aligned with business objectives

  • Validation of policies and compliance

  • Implemention of provisioning and segmentation of block-permit policy enablement

  • Implemention of actionable analytics in Business Critical Services to predict opportunities and preempt risks

Value

  • Reduced security risk in the data center by quickly identifying common vulnerabilities and exposures

  • Used application insights to align network policy with business policy requirements

Ensure network security policy and compliance

How

  • Utilize Cisco Network Assurance Engine to proactively verify network-wide behavior and catch dynamic state issues before users experience service degradation

  • Ensure network security policy and compliance

CX Capabilities Delivered

  • Deployment of Cisco Network Assurance Engine

  • Provision of comprehensive monitoring and management through Cisco Managed Services for Data Center and Cloud

  • Implementation of actionable analytics in Business Critical Services to predict opportunities and preempt risks

Value

  • Increased data and application protection by proactively verifying datacenter network state, policy and behavior

  • Reduced or eliminated change-induced errors and outages by predicting the impact of changes

  • Avoided downtime and lost revenue by minimizing human errors and eliminating configuration drift

Secure Data Center architecture

Security and consistent policies from on-premise to public cloud

For partners

Are you a Cisco partner?

Log in to see additional resources.

Log in

Looking for a solution from a Cisco partner?

Connect with our partner ecosystem.

Connect with a partner