Tetration Implementation Services

SecurView helps fortify business critical application services in an expanding multi-cloud network infrastructure using Cisco Tetration.

 

Challenges

Recent trends in IT infrastructure and application development exposed limitations of traditional perimeter-based IT security and network segmentation technologies by the following:

• The network expansion to public cloud and hybrid cloud environments increased attack surfaces.

• The use of de-centralized application development, adoption of rapid application deployment technologies and short release cycles increased chances of bad actors exploiting security vulnerabilities.

Why Tetration Services from SecurView

How does micro-segmentation help mitigate a security breach?

Essentially micro-segmentation restricts lateral movements in a data center by dividing the network into smaller security zones enabling implementation, which allows use for more granular security policies. Cisco Tetration makes micro-segmentation possible for the multi-cloud environment like never before. It provides the ability to discover application dependencies, detects common vulnerabilities, detects anomalous behavior, and enable on-going application compliance. It provides the capability to implement and enforce micro-segmentation and quarantine server(s) when vulnerabilities are detected. Implementation of such a solution requires deep expertise in network architecture and security. Organizations need a professional services partner who can guide them through planning, design and implementation.

Scope of Service

 
023-support_1.png

Cisco Tetration Workshop

The Cisco Tetration Workshop is designed to help you understand the nuances of micro-segmentation, and how it would complement other cyber security solutions to help improve security posture of your organization.

More Info

Cisco Tetration Workshop

SecurView offers a one-day workshop on micro-segmentation that includes:

  • Fundamentals of micro-segmentation.

  • Introduction to Cisco Tetration and how micro-segmentation is implemented using Cisco Tetration.

  • Live demo in a lab environment to review capabilities of Cisco Tetration

    • discovery of application dependencies

    • policy impact analysis

    • enforcement
    • compliance
  • High level plan for limited implementation of Tetration in your organization.
 
005-clipboard_1.png

Cisco Tetration POV Services

Cisco Tetration Proof of Value (POV) services are designed to help you understand functions and features of Cisco Tetration, help you plan implementation of Cisco Tetration in your environment.

More Info

The following activities are performed as part of the POV service:

• Identify specific dev/test applications for implementation and verification

• Identify specific use cases for implementation

• Configure Tetration cloud tenant

• Install and configure Tetration sensors on identified application workloads

• Implement, test, and verify micro-segmentation policies

 
004-setting_1.png

Cisco Tetration Implementation Services

Configure solution and Implement Application Segmentation SecurView offers a one-day workshop on micro-segmentation that includes Fundamentals of
micro-segmentation.

More Info

SecurView’s Tetration Implementation Services are full life-cycle services intended to assist customer with requirements analysis, design, and implementation of Cisco Tetration.

Cisco Tetration Implementation Services include:

  • Requirements analysis
  • High level design
  • Assistance with identification target applications
  • Configure Tetration cloud tenant
  • Installation and configuration of
  • Tetration sensors on identified workloads
  • Implementation and verification of micro-segmentation policies
  • Identification of software vulnerabilities on workloads
  • Cutover support
  • Implementation roadmap for rest of the application infrastructure
  • Assistance with operational processes