Top

Using Tetration for Application Security and Policy Enforcement

January 11, 2019

Category:

Protecting assets within the enterprise requires the network manager to adopt automated methods of implementing policy on endpoints. A defense in depth approach, applying a consistent policy to the traditional firewall as well as policy enforcement on the host, takes a systemic view of the network.

Value added resellers are increasingly helping customers deploy solutions comprised of vendor hardware and software, support for open source software, and developing code which integrates these components. A great example of this, and the subject of this blog, is World Wide Technologies making its integration with Ansible Tower and Cisco Tetration available as open source through Cisco DevNet Code Exchange.

Read More on Cisco Blog