Cisco Tetration release 3.4 expands support for micro-segmentation, workload and container security
Cisco Tetration, a leader in micro-segmentation and workload security, announces significant new enhancements, available now, that help security architects achieve the protection required for today’s heterogeneous multicloud environments.
One of the key challenge’s businesses face is how to provide a secure infrastructure for applications without compromising business agility. With the rise of cloud usage, containers and microservices architectures, you need a solution that brings security closer to your applications using a new firewall type of enforcement that surrounds each workload. Many companies like Per Mar Security Services choose Tetration to be the foundation of their zero-trust and broader cybersecurity plan, protecting their critical applications from compromise.
This latest Tetration release includes features that support new microsegmentation capabilities, workload protection, sensor support for new operating system versions, platform features required for enterprise customers and much more.
Enhancements include:
Microsegmentation:Enhanced usability and management of microsegmentation. Granular control to specify which workloads should receive what policy elements, making policy definition, generation, and enforcement much more flexible and customizable to your environment
Latest versions and enhancements across Kubernetes and OpenShift orchestration platforms and support for microsegmentation policy enforcement on ingress controllers such as HAProxy or Nginx .
Application dependency mapping updates to speed policy generation. (ADM offers forensic understanding of applications/workloads and their complex interdependencies)
Compromised state awareness: alerting/ policy changes after a workload or endpoint is detected as compromised with flows to a known threat.
Workload Protection:Enhanced vulnerability detection that leverages, in addition to NIST CVE (Common Vulnerabilities and Exposures) database, the latest threat intelligence from Operating System vendors to ensure accuracy and the most up to date risk profile for applications in your environment.
New MITRE-based attack detection techniques and tactics plus several new anomalous Windows processes alerts.
Usability and operational improvementsNew and improved user interface to better visualize and manage application scopes, workloads that are part of those applications and associated hierarchies.
Improved visualization of policy version differences to easily understand what rules were added or removed and also filter for specific rules based on number of parameters.
Resiliency features including new mode of continuous data backup, new backup and restore workflows, the Federation of multiple Tetration clusters for a high degree of scalability and availability.
Software sensors:OS updates: Support for the latest versions of key operating systems our customers care about (RHEL, CentOS, Oracle Linux, Ubuntu, plus added support for IBM AIX for legacy applications in key verticals like healthcare and financials.
Easily transition from deep visibility to policy enforcement to speed the time to microsegmentation
Enhanced monitoring and management features for better sensor visibility and usability in key areas like monitoring, installation, upgrade status.
3rd Party Ecosystem PartnersServiceNow CMDB integration for ingesting CI (Configuration Item) attributes to provide more context to help define inventory filters, tag workloads, define policies, and visualize flow traffic.
Native support for Workload AD (Windows Domain Controller) for rich user and workload context to enhance policy definition, inventory filters and visualize flow traffic.