<img height="1" width="1" style="display:none;" alt="" src="https://px.ads.linkedin.com/collect/?pid=4393876&amp;fmt=gif">

Cisco Secure Workload Application Quickstart

CSW Microsegmentation

Business Technology Architects' (BTA) CSW Application Quickstart gets you started with application segmentation quickly, safely, and securely. BTA's deep experience with CSW has enabled us to define a set of segmentation use cases that are common across many customers. We've developed and refined these use cases; de-risking their deployment to provide you with rapid experience with the benefits of application segmentation.

Schedule A Call Today

Understanding Microsegmentation

Microsegmentation has quickly become a key component of most security processes. The process of CSW microsegmentation may seem complicated at first, but it is quite simple; it is a pivotal part of keeping your network and company secure. An attack surface is defined as the number of all possible/potential points and locations where an unauthorized user can gain access to a system, allowing the unauthorized user to extract and steal data and information. Microsegmentation allows security policies to exist much closer to each individual application. In practice, this will proactively reduce the attack surface, making it much more difficult for unauthorized users to gain control and access to your private data.

Microsegmentation is often considered the first step in establishing a Zero Trust Network. Using a Zero Trust take on network security, there is a necessary assumption that no network segment is secure/without breach. Zero Trust network security also switches the user authentication from user to application, rather than user to network. After completing both of these steps, the perimeter of the workloads (applications) themselves is effectively shortened. However, in order to place said perimeters as close as possible to each workload, you will need to implement microsegmentation. With this in mind, it is evident that both microsegmentation and a Zero Trust security approach go hand in hand.

Cisco Secure Workload Microsegmentation

Cisco Secure Workload (CSW) deployment is able to use machine learning to learn, understand, and monitor your applications' typical behavior. In doing this, CSW can identify when the said application's behavior does not fall in line with the previously learned typical behavior. CSW is then able to specially procure certain security policies throughout any and all applicable workloads. Because these security policies are procured specifically for your company's workloads, they are rendered to be extremely simple, efficient, and most of all effective. CSW is able to constantly monitor applications. In doing this, CSW can identify vulnerabilities and any potential exposures. To remedy this, CSW will offer specially procured security policies to fix these said vulnerabilities, effectively shrinking your application's attack surface. The smaller the segments, the less invasive a potential attack can be. CSW is also able to flag certain anomalies for your review. All of these processes are completed extremely quickly, as we value how precious time is in dealing with network security.

Application Segmentation Use Cases

Management Control Lockdown: Restricting server management control protocols to a known set of management workstations or jump servers.
Vulnerability Mitigation Policy Example: Blocking pings from hosts vulnerable to a particular CVSS Severity Rating (e.g. quarantine all "critical" severities).
Restricting Services: Restricting DNS, NTP, etc. to particular servers in your data center.
DMZ Workload Protection: Filtering incoming public Internet traffic to approved DMZ environments.
Internal Workload Protection: For hosts that should NOT connect with the internet, deploy policy that only allow them to communicate with known internal addresses.
iStock-1469706271

The CSW Microsegmentation Process - How It Works

If you’re looking to quickly begin your journey into segmentation, a consultation with BTA is the perfect place to start. With our extensive knowledge and plentiful experience in segmentation, we were able to define and solidify a process of use cases that are typically applicable to all customers. Select up to two of the typical application segmentation use cases. BTA's experts will engage with your team in a consultative process to ensure success.
1
In working with our BTA experts, we will select up to 50 different nearby servers in a production environment.
2
After selecting the servers, we will deploy software agents to collect the traffic coming to and from those selected servers. This process will take approximately two weeks.
3
BTA will host ADM (Application Dependency Mapping) sessions with your team to analyze the data. Using CSW's deep flow analysis and BTA's expertise, we'll define the two applications in your environment and model the required segmentation.
4
After an iterative series of non-impactful testing and analyses, we'll follow your processes to enable segmentation and you'll experience, first-hand, the security advantages of application segmentation.
Quote Icon 1

We were extremely impressed with the work they did, how they did it and their delivery. We’ll absolutely use them going forward in the future.

- Pam Austin, CIO at Ballad Health 

Quote Icon 2
Our Approach

BTA’s S.I.M.P.L.E. methodology is a structured, step-by-step approach that breaks down IT complexity into manageable phases: Start, Immerse, Map, Prove, Launch, and Evolve. This methodology ensures every solution is tailored, efficient, and results-driven.

SIMPLE

Don’t Take Our Word For It.
See What Our Clients Say

Explore Success Stories of How We’ve Transformed IT Operations for Businesses Like Yours.

Securing Workloads Across Your Entire Environment

Join Founder and CEO Ken Fee and Principal Architect Dana Blair for a conversation about intelligently securing workloads across the entire environment using Cisco Secure Workload.

About BTA

Your Trusted Partner For IT Success

BTA is here for all of your CSW needs – everything from training and deployment to consulting and optimization. Our S.I.M.P.L.E. process ensures that your team is able to quickly operationalize the full value of the solutions you’ve invested in, with a solid team of experts behind you.

iStock-1073009018
Why Us 1 White

A Mission That Drives Us: Our mission is simple yet powerful: Simplify IT complexity so businesses can focus on achieving their goals.

Why Us 2

Unmatched Expertise: With decades of experience, we bring deep expertise in data center networking, cybersecurity, IT strategy, and system optimization. 

Why Us 3 White

A Proven Methodology for Success: Our S.I.M.P.L.E. framework delivers streamlined solutions, fosters innovation, and ensures measurable results.

Insights & Resources

Explore our latest insights, industry trends, and resources on Security, Automation, and Networking.