1

 · 2. Turning the network into a security sensor and enforcer with Cisco Stealth Watch and ISE 3. Automating IT operations with ACI Result: 1. Security included @ the network fabric

  • Upload
    others

  • View
    2

  • Download
    0

Embed Size (px)

Citation preview

Page 1:  · 2. Turning the network into a security sensor and enforcer with Cisco Stealth Watch and ISE 3. Automating IT operations with ACI Result: 1. Security included @ the network fabric