Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the easy-accordion-free domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php on line 6114

Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the zoho-flow domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php on line 6114

Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the wordpress-seo domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php on line 6114

Warning: Cannot modify header information - headers already sent by (output started at /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php:6114) in /home/mother99/jacksonholdingcompany.com/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php:6114) in /home/mother99/jacksonholdingcompany.com/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php:6114) in /home/mother99/jacksonholdingcompany.com/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php:6114) in /home/mother99/jacksonholdingcompany.com/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php:6114) in /home/mother99/jacksonholdingcompany.com/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php:6114) in /home/mother99/jacksonholdingcompany.com/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php:6114) in /home/mother99/jacksonholdingcompany.com/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php:6114) in /home/mother99/jacksonholdingcompany.com/wp-includes/rest-api/class-wp-rest-server.php on line 1893
{"id":3388,"date":"2024-06-17T18:50:23","date_gmt":"2024-06-17T18:50:23","guid":{"rendered":"https:\/\/jacksonholdingcompany.com\/stay-compliant-cisco-secure-workload-introduces-state-of-the-art-persona-based-reporting-on-june-17-2024-at-1200-pm\/"},"modified":"2024-06-17T18:50:23","modified_gmt":"2024-06-17T18:50:23","slug":"stay-compliant-cisco-secure-workload-introduces-state-of-the-art-persona-based-reporting-on-june-17-2024-at-1200-pm","status":"publish","type":"post","link":"https:\/\/jacksonholdingcompany.com\/stay-compliant-cisco-secure-workload-introduces-state-of-the-art-persona-based-reporting-on-june-17-2024-at-1200-pm\/","title":{"rendered":"Stay Compliant: Cisco Secure Workload Introduces State-of-the-art, Persona-based Reporting on June 17, 2024 at 12:00 pm"},"content":{"rendered":"

Traditional workload security tools often fail to provide metrics tailored to the distinct needs of SecOps, Network Administrators, or CxOs.<\/p>\n

\u200b[[{“value”:”<\/p>\n

Workload security tools draw the attention of diverse cohorts, united by a mission: fortifying hybrid cloud workloads. In a market filled with disparate tools, Secure Workload offers a tailored reporting solution that revolutionizes how SecOps, Network Administrators, and CxOs interact with their workload security solution.<\/p>\n

A New Era of Informed Decision Making<\/strong><\/h2>\n

Traditional workload security tools often fail to provide metrics tailored to the distinct needs of SecOps, Network Administrators, or CxOs. These tools fall short due to a lack of development focus on holistic user requirements and an inadequate understanding of the diverse metrics that each of them values.<\/p>\n

For example, SecOps teams require detailed insights into Cisco Security Risk scores, workload vulnerabilities, and the effectiveness of security policies. NetOps, on the other hand, requires visibility into agent health and policy compliance, and CxOs need high-level summaries that demonstrate cost savings and ROI. Without these tailored insights, traditional tools fail to offer a comprehensive view of security effectiveness.<\/p>\n

The shift towards DevSecOps, AI-driven security, and Cloud Native security has led to cumbersome back-and-forth communication and the need to share information across siloed network, security, and application development functions. In the past couple of years, we have seen a surge in productivity-enhancing feature requests from customers, driven by the challenges of siloed networks and security organizations not sharing information. This lack of integration highlights the critical need for a single pane of glass view that can provide a unified perspective of the organization\u2019s security posture.<\/p>\n

By consolidating data from various functions into one comprehensive dashboard, the Reporting Dashboard addresses these challenges facilitating smoother communication, enhanced collaboration, and more effective security management across all teams.<\/p>\n

Addresses Challenges Directly<\/strong><\/h2>\n

Let\u2019s delve into the specific outcomes that the Reporting Dashboard delivers.<\/p>\n

Reporting Dashboard Landing View<\/p>\n

Data-driven Insights for CxO and SecOps<\/em><\/strong><\/h2>\n

The feedback from CxO participants at Secure Workload\u2019s Customer Advisory Board highlights the need for personalized reports that deliver actionable intelligence. The out-of-the-box summary of security, compliance, and evidence-based metrics is invaluable for the CxO. By showcasing the percentage of workloads protected with Secure Workload agent coverage on the license utilization chart and workspace policy coverage, SecOps can demonstrate tangible productivity gains to CxOs. Moreover, by quantifying the time savings in policy maintenance, SecOps, and Network Admins can provide CxOs with actionable analytics that illustrate the efficiency and effectiveness of their microsegmentation strategy.<\/p>\n

This data-driven approach empowers CxOs to make informed decisions and strategically channel investments to optimize their company\u2019s security posture.<\/p>\n

Empower NetOps<\/em><\/strong><\/h2>\n

NetOps enjoys enhanced visibility with the Reporting Dashboard, which provides a consolidated view of deployed agents and other assets. This allows NetOps to quickly identify and address agent issues, ensuring seamless operation of critical assets.<\/p>\n

Policy Compliance is simplified through a single, unified view that highlights workspaces without enforcement and identifies policy discrepancies, and policy sync issues. This streamlined approach aids NetOps in ensuring policy compliance.<\/p>\n

Insights from the Cluster Summary enable NetOps to establish retention policies for regulatory compliance and mitigate the risk of unauthorized access, while the Telemetry Summary provides a comprehensive view of telemetry sources and their health status enabling NetOps to swiftly identify and resolve issues.<\/p>\n

The effectiveness of the \u2018Telemetry Summary\u2019 was validated when a customer shared their feedback \u2013\u00a0 \u201cI like this quick viewpoint which should help troubleshoot\u00a0duplicates.\u201d\u200b<\/p>\n

Telemetry Summary section highlighting Inventory issues for NetOps<\/p>\n

Elevate SecOps Productivity <\/em><\/strong><\/h2>\n

Prioritizing CVEs alleviates the challenge of CVE prioritization as shown in the image below.
\nProviding workload summaries with enforcement status, enabling seamless policy enforcement assessment.
\nCVE Prioritization<\/p>\n

Equipped with predefined rules and MITRE TTPs, CSW agents can detect suspicious application behavior with precision. Reporting Dashboard complements these capabilities by providing users with a brand-new intuitive experience.<\/p>\n

Ready to experience the power of informed decision-making with Secure Workload Reporting? Whether you\u2019re upgrading to Secure Workload 3.9<\/a> or starting fresh, embark on a journey of unparalleled security for your hybrid cloud workloads.<\/p>\n

We\u2019d love to hear what you think. Ask a Question, Comment Below, and Stay Connected with Cisco Security on social!<\/em><\/p>\n

Cisco Security Social Channels<\/strong><\/p>\n

Instagram<\/a><\/strong>Facebook<\/a><\/strong>Twitter<\/a><\/strong>LinkedIn<\/a><\/strong><\/p>\n

\n\t\tShare\n
\n
<\/div>\n<\/div>\n
\n
\n\t\t<\/a>\n\t<\/div>\n<\/div>\n
\n
\n\t\t<\/a>\n\t<\/div>\n<\/div>\n
\n
\n\t <\/a>\n\t<\/div>\n<\/div>\n<\/div>\n
Share:<\/div>\n
\n
\n
<\/div>\n<\/div>\n
\n
\n\t\t<\/a>\n\t<\/div>\n<\/div>\n
\n
\n\t\t<\/a>\n\t<\/div>\n<\/div>\n
\n
\n\t <\/a>\n\t<\/div>\n<\/div>\n<\/div>\n

“}]]\u00a0\u00a0Traditional workload security tools often fail to provide metrics tailored to the distinct needs of SecOps, Network Administrators, or CxOs.\u00a0\u00a0Read More<\/a>\u00a0Cisco Blogs\u00a0<\/p>","protected":false},"excerpt":{"rendered":"

<\/p>\n

Traditional workload security tools often fail to provide metrics tailored to the distinct needs of SecOps, Network Administrators, or CxOs.<\/p>\n

\u200b[[{“value”:”<\/p>\n

Workload security tools draw the attention of diverse cohorts, united by a mission: fortifying hybrid cloud workloads. In a market filled with disparate tools, Secure Workload offers a tailored reporting solution that revolutionizes how SecOps, Network Administrators, and CxOs interact with their workload security solution.<\/p>\n

A New Era of Informed Decision Making<\/strong><\/h2>\n

Traditional workload security tools often fail to provide metrics tailored to the distinct needs of SecOps, Network Administrators, or CxOs. These tools fall short due to a lack of development focus on holistic user requirements and an inadequate understanding of the diverse metrics that each of them values.<\/p>\n

For example, SecOps teams require detailed insights into Cisco Security Risk scores, workload vulnerabilities, and the effectiveness of security policies. NetOps, on the other hand, requires visibility into agent health and policy compliance, and CxOs need high-level summaries that demonstrate cost savings and ROI. Without these tailored insights, traditional tools fail to offer a comprehensive view of security effectiveness.<\/p>\n

The shift towards DevSecOps, AI-driven security, and Cloud Native security has led to cumbersome back-and-forth communication and the need to share information across siloed network, security, and application development functions. In the past couple of years, we have seen a surge in productivity-enhancing feature requests from customers, driven by the challenges of siloed networks and security organizations not sharing information. This lack of integration highlights the critical need for a single pane of glass view that can provide a unified perspective of the organization\u2019s security posture.<\/p>\n

By consolidating data from various functions into one comprehensive dashboard, the Reporting Dashboard addresses these challenges facilitating smoother communication, enhanced collaboration, and more effective security management across all teams.<\/p>\n

Addresses Challenges Directly<\/strong><\/h2>\n

Let\u2019s delve into the specific outcomes that the Reporting Dashboard delivers.<\/p>\n

Reporting Dashboard Landing View<\/p>\n

Data-driven Insights for CxO and SecOps<\/em><\/strong><\/h2>\n

The feedback from CxO participants at Secure Workload\u2019s Customer Advisory Board highlights the need for personalized reports that deliver actionable intelligence. The out-of-the-box summary of security, compliance, and evidence-based metrics is invaluable for the CxO. By showcasing the percentage of workloads protected with Secure Workload agent coverage on the license utilization chart and workspace policy coverage, SecOps can demonstrate tangible productivity gains to CxOs. Moreover, by quantifying the time savings in policy maintenance, SecOps, and Network Admins can provide CxOs with actionable analytics that illustrate the efficiency and effectiveness of their microsegmentation strategy.<\/p>\n

This data-driven approach empowers CxOs to make informed decisions and strategically channel investments to optimize their company\u2019s security posture.<\/p>\n

Empower NetOps<\/em><\/strong><\/h2>\n

NetOps enjoys enhanced visibility with the Reporting Dashboard, which provides a consolidated view of deployed agents and other assets. This allows NetOps to quickly identify and address agent issues, ensuring seamless operation of critical assets.<\/p>\n

Policy Compliance is simplified through a single, unified view that highlights workspaces without enforcement and identifies policy discrepancies, and policy sync issues. This streamlined approach aids NetOps in ensuring policy compliance.<\/p>\n

Insights from the Cluster Summary enable NetOps to establish retention policies for regulatory compliance and mitigate the risk of unauthorized access, while the Telemetry Summary provides a comprehensive view of telemetry sources and their health status enabling NetOps to swiftly identify and resolve issues.<\/p>\n

The effectiveness of the \u2018Telemetry Summary\u2019 was validated when a customer shared their feedback \u2013\u00a0 \u201cI like this quick viewpoint which should help troubleshoot\u00a0duplicates.\u201d\u200b<\/p>\n

Telemetry Summary section highlighting Inventory issues for NetOps<\/p>\n

Elevate SecOps Productivity <\/em><\/strong><\/h2>\n

Prioritizing CVEs alleviates the challenge of CVE prioritization as shown in the image below.
\nProviding workload summaries with enforcement status, enabling seamless policy enforcement assessment.
\nCVE Prioritization<\/p>\n

Equipped with predefined rules and MITRE TTPs, CSW agents can detect suspicious application behavior with precision. Reporting Dashboard complements these capabilities by providing users with a brand-new intuitive experience.<\/p>\n

Ready to experience the power of informed decision-making with Secure Workload Reporting? Whether you\u2019re upgrading to Secure Workload 3.9<\/a> or starting fresh, embark on a journey of unparalleled security for your hybrid cloud workloads.<\/p>\n

We\u2019d love to hear what you think. Ask a Question, Comment Below, and Stay Connected with Cisco Security on social!<\/em><\/p>\n

Cisco Security Social Channels<\/strong><\/p>\n

Instagram<\/a><\/strong>Facebook<\/a><\/strong>Twitter<\/a><\/strong>LinkedIn<\/a><\/strong><\/p>\n

\n\t\tShare<\/p>\n
\n
<\/div>\n<\/div>\n
\n
\n\t\t<\/a>\n\t<\/div>\n<\/div>\n
\n
\n\t\t<\/a>\n\t<\/div>\n<\/div>\n
\n
\n\t <\/a>\n\t<\/div>\n<\/div>\n<\/div>\n
Share:<\/div>\n
\n
\n
<\/div>\n<\/div>\n
\n
\n\t\t<\/a>\n\t<\/div>\n<\/div>\n
\n
\n\t\t<\/a>\n\t<\/div>\n<\/div>\n
\n
\n\t <\/a>\n\t<\/div>\n<\/div>\n<\/div>\n

“}]]\u00a0\u00a0Traditional workload security tools often fail to provide metrics tailored to the distinct needs of SecOps, Network Administrators, or CxOs.\u00a0\u00a0Read More<\/a>\u00a0Cisco Blogs\u00a0<\/p>\n

<\/p>\n","protected":false},"author":0,"featured_media":3389,"comment_status":"","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[12],"tags":[],"class_list":["post-3388","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cisco-learning"],"yoast_head":"\nStay Compliant: Cisco Secure Workload Introduces State-of-the-art, Persona-based Reporting on June 17, 2024 at 12:00 pm - JHC<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/jacksonholdingcompany.com\/stay-compliant-cisco-secure-workload-introduces-state-of-the-art-persona-based-reporting-on-june-17-2024-at-1200-pm\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Stay Compliant: Cisco Secure Workload Introduces State-of-the-art, Persona-based Reporting on June 17, 2024 at 12:00 pm\" \/>\n<meta property=\"og:description\" content=\"Traditional workload security tools often fail to provide metrics tailored to the distinct needs of SecOps, Network Administrators, or CxOs. \u200b[[{"value":" Workload security tools draw the attention of diverse cohorts, united by a mission: fortifying hybrid cloud workloads. In a market filled with disparate tools, Secure Workload offers a tailored reporting solution that revolutionizes how SecOps, Network Administrators, and CxOs interact with their workload security solution. A New Era of Informed Decision Making Traditional workload security tools often fail to provide metrics tailored to the distinct needs of SecOps, Network Administrators, or CxOs. These tools fall short due to a lack of development focus on holistic user requirements and an inadequate understanding of the diverse metrics that each of them values. For example, SecOps teams require detailed insights into Cisco Security Risk scores, workload vulnerabilities, and the effectiveness of security policies. NetOps, on the other hand, requires visibility into agent health and policy compliance, and CxOs need high-level summaries that demonstrate cost savings and ROI. Without these tailored insights, traditional tools fail to offer a comprehensive view of security effectiveness. The shift towards DevSecOps, AI-driven security, and Cloud Native security has led to cumbersome back-and-forth communication and the need to share information across siloed network, security, and application development functions. In the past couple of years, we have seen a surge in productivity-enhancing feature requests from customers, driven by the challenges of siloed networks and security organizations not sharing information. This lack of integration highlights the critical need for a single pane of glass view that can provide a unified perspective of the organization\u2019s security posture. By consolidating data from various functions into one comprehensive dashboard, the Reporting Dashboard addresses these challenges facilitating smoother communication, enhanced collaboration, and more effective security management across all teams. Addresses Challenges Directly Let\u2019s delve into the specific outcomes that the Reporting Dashboard delivers. Reporting Dashboard Landing View Data-driven Insights for CxO and SecOps The feedback from CxO participants at Secure Workload\u2019s Customer Advisory Board highlights the need for personalized reports that deliver actionable intelligence. The out-of-the-box summary of security, compliance, and evidence-based metrics is invaluable for the CxO. By showcasing the percentage of workloads protected with Secure Workload agent coverage on the license utilization chart and workspace policy coverage, SecOps can demonstrate tangible productivity gains to CxOs. Moreover, by quantifying the time savings in policy maintenance, SecOps, and Network Admins can provide CxOs with actionable analytics that illustrate the efficiency and effectiveness of their microsegmentation strategy. This data-driven approach empowers CxOs to make informed decisions and strategically channel investments to optimize their company\u2019s security posture. Empower NetOps NetOps enjoys enhanced visibility with the Reporting Dashboard, which provides a consolidated view of deployed agents and other assets. This allows NetOps to quickly identify and address agent issues, ensuring seamless operation of critical assets. Policy Compliance is simplified through a single, unified view that highlights workspaces without enforcement and identifies policy discrepancies, and policy sync issues. This streamlined approach aids NetOps in ensuring policy compliance. Insights from the Cluster Summary enable NetOps to establish retention policies for regulatory compliance and mitigate the risk of unauthorized access, while the Telemetry Summary provides a comprehensive view of telemetry sources and their health status enabling NetOps to swiftly identify and resolve issues. The effectiveness of the \u2018Telemetry Summary\u2019 was validated when a customer shared their feedback \u2013\u00a0 \u201cI like this quick viewpoint which should help troubleshoot\u00a0duplicates.\u201d\u200b Telemetry Summary section highlighting Inventory issues for NetOps Elevate SecOps Productivity Prioritizing CVEs alleviates the challenge of CVE prioritization as shown in the image below. Providing workload summaries with enforcement status, enabling seamless policy enforcement assessment. CVE Prioritization Equipped with predefined rules and MITRE TTPs, CSW agents can detect suspicious application behavior with precision. Reporting Dashboard complements these capabilities by providing users with a brand-new intuitive experience. Ready to experience the power of informed decision-making with Secure Workload Reporting? Whether you\u2019re upgrading to Secure Workload 3.9 or starting fresh, embark on a journey of unparalleled security for your hybrid cloud workloads. We\u2019d love to hear what you think. Ask a Question, Comment Below, and Stay Connected with Cisco Security on social! Cisco Security Social Channels InstagramFacebookTwitterLinkedIn Share Share: "}]]\u00a0\u00a0Traditional workload security tools often fail to provide metrics tailored to the distinct needs of SecOps, Network Administrators, or CxOs.\u00a0\u00a0Read More\u00a0Cisco Blogs\u00a0\" \/>\n<meta property=\"og:url\" content=\"https:\/\/jacksonholdingcompany.com\/stay-compliant-cisco-secure-workload-introduces-state-of-the-art-persona-based-reporting-on-june-17-2024-at-1200-pm\/\" \/>\n<meta property=\"og:site_name\" content=\"JHC\" \/>\n<meta property=\"article:published_time\" content=\"2024-06-17T18:50:23+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2024\/06\/16716835-q9FUo8.gif\" \/>\n\t<meta property=\"og:image:width\" content=\"1\" \/>\n\t<meta property=\"og:image:height\" content=\"1\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/gif\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/jacksonholdingcompany.com\/stay-compliant-cisco-secure-workload-introduces-state-of-the-art-persona-based-reporting-on-june-17-2024-at-1200-pm\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/stay-compliant-cisco-secure-workload-introduces-state-of-the-art-persona-based-reporting-on-june-17-2024-at-1200-pm\/\"},\"author\":{\"name\":\"\",\"@id\":\"\"},\"headline\":\"Stay Compliant: Cisco Secure Workload Introduces State-of-the-art, Persona-based Reporting on June 17, 2024 at 12:00 pm\",\"datePublished\":\"2024-06-17T18:50:23+00:00\",\"dateModified\":\"2024-06-17T18:50:23+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/stay-compliant-cisco-secure-workload-introduces-state-of-the-art-persona-based-reporting-on-june-17-2024-at-1200-pm\/\"},\"wordCount\":740,\"publisher\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/stay-compliant-cisco-secure-workload-introduces-state-of-the-art-persona-based-reporting-on-june-17-2024-at-1200-pm\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2024\/06\/16716835-q9FUo8.gif\",\"articleSection\":[\"Cisco: Learning\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/jacksonholdingcompany.com\/stay-compliant-cisco-secure-workload-introduces-state-of-the-art-persona-based-reporting-on-june-17-2024-at-1200-pm\/\",\"url\":\"https:\/\/jacksonholdingcompany.com\/stay-compliant-cisco-secure-workload-introduces-state-of-the-art-persona-based-reporting-on-june-17-2024-at-1200-pm\/\",\"name\":\"Stay Compliant: Cisco Secure Workload Introduces State-of-the-art, Persona-based Reporting on June 17, 2024 at 12:00 pm - JHC\",\"isPartOf\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/stay-compliant-cisco-secure-workload-introduces-state-of-the-art-persona-based-reporting-on-june-17-2024-at-1200-pm\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/stay-compliant-cisco-secure-workload-introduces-state-of-the-art-persona-based-reporting-on-june-17-2024-at-1200-pm\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2024\/06\/16716835-q9FUo8.gif\",\"datePublished\":\"2024-06-17T18:50:23+00:00\",\"dateModified\":\"2024-06-17T18:50:23+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/stay-compliant-cisco-secure-workload-introduces-state-of-the-art-persona-based-reporting-on-june-17-2024-at-1200-pm\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/jacksonholdingcompany.com\/stay-compliant-cisco-secure-workload-introduces-state-of-the-art-persona-based-reporting-on-june-17-2024-at-1200-pm\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/jacksonholdingcompany.com\/stay-compliant-cisco-secure-workload-introduces-state-of-the-art-persona-based-reporting-on-june-17-2024-at-1200-pm\/#primaryimage\",\"url\":\"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2024\/06\/16716835-q9FUo8.gif\",\"contentUrl\":\"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2024\/06\/16716835-q9FUo8.gif\",\"width\":1,\"height\":1},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/jacksonholdingcompany.com\/stay-compliant-cisco-secure-workload-introduces-state-of-the-art-persona-based-reporting-on-june-17-2024-at-1200-pm\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/jacksonholdingcompany.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Stay Compliant: Cisco Secure Workload Introduces State-of-the-art, Persona-based Reporting on June 17, 2024 at 12:00 pm\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/jacksonholdingcompany.com\/#website\",\"url\":\"https:\/\/jacksonholdingcompany.com\/\",\"name\":\"JHC\",\"description\":\"Your Business Is Our Business\",\"publisher\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/jacksonholdingcompany.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/jacksonholdingcompany.com\/#organization\",\"name\":\"JHC\",\"url\":\"https:\/\/jacksonholdingcompany.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/jacksonholdingcompany.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2023\/07\/cropped-cropped-jHC-white-500-\u00d7-200-px-1-1.png\",\"contentUrl\":\"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2023\/07\/cropped-cropped-jHC-white-500-\u00d7-200-px-1-1.png\",\"width\":452,\"height\":149,\"caption\":\"JHC\"},\"image\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Stay Compliant: Cisco Secure Workload Introduces State-of-the-art, Persona-based Reporting on June 17, 2024 at 12:00 pm - JHC","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/jacksonholdingcompany.com\/stay-compliant-cisco-secure-workload-introduces-state-of-the-art-persona-based-reporting-on-june-17-2024-at-1200-pm\/","og_locale":"en_US","og_type":"article","og_title":"Stay Compliant: Cisco Secure Workload Introduces State-of-the-art, Persona-based Reporting on June 17, 2024 at 12:00 pm","og_description":"Traditional workload security tools often fail to provide metrics tailored to the distinct needs of SecOps, Network Administrators, or CxOs. \u200b[[{\"value\":\" Workload security tools draw the attention of diverse cohorts, united by a mission: fortifying hybrid cloud workloads. In a market filled with disparate tools, Secure Workload offers a tailored reporting solution that revolutionizes how SecOps, Network Administrators, and CxOs interact with their workload security solution. A New Era of Informed Decision Making Traditional workload security tools often fail to provide metrics tailored to the distinct needs of SecOps, Network Administrators, or CxOs. These tools fall short due to a lack of development focus on holistic user requirements and an inadequate understanding of the diverse metrics that each of them values. For example, SecOps teams require detailed insights into Cisco Security Risk scores, workload vulnerabilities, and the effectiveness of security policies. NetOps, on the other hand, requires visibility into agent health and policy compliance, and CxOs need high-level summaries that demonstrate cost savings and ROI. Without these tailored insights, traditional tools fail to offer a comprehensive view of security effectiveness. The shift towards DevSecOps, AI-driven security, and Cloud Native security has led to cumbersome back-and-forth communication and the need to share information across siloed network, security, and application development functions. In the past couple of years, we have seen a surge in productivity-enhancing feature requests from customers, driven by the challenges of siloed networks and security organizations not sharing information. This lack of integration highlights the critical need for a single pane of glass view that can provide a unified perspective of the organization\u2019s security posture. By consolidating data from various functions into one comprehensive dashboard, the Reporting Dashboard addresses these challenges facilitating smoother communication, enhanced collaboration, and more effective security management across all teams. Addresses Challenges Directly Let\u2019s delve into the specific outcomes that the Reporting Dashboard delivers. Reporting Dashboard Landing View Data-driven Insights for CxO and SecOps The feedback from CxO participants at Secure Workload\u2019s Customer Advisory Board highlights the need for personalized reports that deliver actionable intelligence. The out-of-the-box summary of security, compliance, and evidence-based metrics is invaluable for the CxO. By showcasing the percentage of workloads protected with Secure Workload agent coverage on the license utilization chart and workspace policy coverage, SecOps can demonstrate tangible productivity gains to CxOs. Moreover, by quantifying the time savings in policy maintenance, SecOps, and Network Admins can provide CxOs with actionable analytics that illustrate the efficiency and effectiveness of their microsegmentation strategy. This data-driven approach empowers CxOs to make informed decisions and strategically channel investments to optimize their company\u2019s security posture. Empower NetOps NetOps enjoys enhanced visibility with the Reporting Dashboard, which provides a consolidated view of deployed agents and other assets. This allows NetOps to quickly identify and address agent issues, ensuring seamless operation of critical assets. Policy Compliance is simplified through a single, unified view that highlights workspaces without enforcement and identifies policy discrepancies, and policy sync issues. This streamlined approach aids NetOps in ensuring policy compliance. Insights from the Cluster Summary enable NetOps to establish retention policies for regulatory compliance and mitigate the risk of unauthorized access, while the Telemetry Summary provides a comprehensive view of telemetry sources and their health status enabling NetOps to swiftly identify and resolve issues. The effectiveness of the \u2018Telemetry Summary\u2019 was validated when a customer shared their feedback \u2013\u00a0 \u201cI like this quick viewpoint which should help troubleshoot\u00a0duplicates.\u201d\u200b Telemetry Summary section highlighting Inventory issues for NetOps Elevate SecOps Productivity Prioritizing CVEs alleviates the challenge of CVE prioritization as shown in the image below. Providing workload summaries with enforcement status, enabling seamless policy enforcement assessment. CVE Prioritization Equipped with predefined rules and MITRE TTPs, CSW agents can detect suspicious application behavior with precision. Reporting Dashboard complements these capabilities by providing users with a brand-new intuitive experience. Ready to experience the power of informed decision-making with Secure Workload Reporting? Whether you\u2019re upgrading to Secure Workload 3.9 or starting fresh, embark on a journey of unparalleled security for your hybrid cloud workloads. We\u2019d love to hear what you think. Ask a Question, Comment Below, and Stay Connected with Cisco Security on social! Cisco Security Social Channels InstagramFacebookTwitterLinkedIn Share Share: \"}]]\u00a0\u00a0Traditional workload security tools often fail to provide metrics tailored to the distinct needs of SecOps, Network Administrators, or CxOs.\u00a0\u00a0Read More\u00a0Cisco Blogs\u00a0","og_url":"https:\/\/jacksonholdingcompany.com\/stay-compliant-cisco-secure-workload-introduces-state-of-the-art-persona-based-reporting-on-june-17-2024-at-1200-pm\/","og_site_name":"JHC","article_published_time":"2024-06-17T18:50:23+00:00","og_image":[{"width":1,"height":1,"url":"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2024\/06\/16716835-q9FUo8.gif","type":"image\/gif"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/jacksonholdingcompany.com\/stay-compliant-cisco-secure-workload-introduces-state-of-the-art-persona-based-reporting-on-june-17-2024-at-1200-pm\/#article","isPartOf":{"@id":"https:\/\/jacksonholdingcompany.com\/stay-compliant-cisco-secure-workload-introduces-state-of-the-art-persona-based-reporting-on-june-17-2024-at-1200-pm\/"},"author":{"name":"","@id":""},"headline":"Stay Compliant: Cisco Secure Workload Introduces State-of-the-art, Persona-based Reporting on June 17, 2024 at 12:00 pm","datePublished":"2024-06-17T18:50:23+00:00","dateModified":"2024-06-17T18:50:23+00:00","mainEntityOfPage":{"@id":"https:\/\/jacksonholdingcompany.com\/stay-compliant-cisco-secure-workload-introduces-state-of-the-art-persona-based-reporting-on-june-17-2024-at-1200-pm\/"},"wordCount":740,"publisher":{"@id":"https:\/\/jacksonholdingcompany.com\/#organization"},"image":{"@id":"https:\/\/jacksonholdingcompany.com\/stay-compliant-cisco-secure-workload-introduces-state-of-the-art-persona-based-reporting-on-june-17-2024-at-1200-pm\/#primaryimage"},"thumbnailUrl":"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2024\/06\/16716835-q9FUo8.gif","articleSection":["Cisco: Learning"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/jacksonholdingcompany.com\/stay-compliant-cisco-secure-workload-introduces-state-of-the-art-persona-based-reporting-on-june-17-2024-at-1200-pm\/","url":"https:\/\/jacksonholdingcompany.com\/stay-compliant-cisco-secure-workload-introduces-state-of-the-art-persona-based-reporting-on-june-17-2024-at-1200-pm\/","name":"Stay Compliant: Cisco Secure Workload Introduces State-of-the-art, Persona-based Reporting on June 17, 2024 at 12:00 pm - JHC","isPartOf":{"@id":"https:\/\/jacksonholdingcompany.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/jacksonholdingcompany.com\/stay-compliant-cisco-secure-workload-introduces-state-of-the-art-persona-based-reporting-on-june-17-2024-at-1200-pm\/#primaryimage"},"image":{"@id":"https:\/\/jacksonholdingcompany.com\/stay-compliant-cisco-secure-workload-introduces-state-of-the-art-persona-based-reporting-on-june-17-2024-at-1200-pm\/#primaryimage"},"thumbnailUrl":"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2024\/06\/16716835-q9FUo8.gif","datePublished":"2024-06-17T18:50:23+00:00","dateModified":"2024-06-17T18:50:23+00:00","breadcrumb":{"@id":"https:\/\/jacksonholdingcompany.com\/stay-compliant-cisco-secure-workload-introduces-state-of-the-art-persona-based-reporting-on-june-17-2024-at-1200-pm\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/jacksonholdingcompany.com\/stay-compliant-cisco-secure-workload-introduces-state-of-the-art-persona-based-reporting-on-june-17-2024-at-1200-pm\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/jacksonholdingcompany.com\/stay-compliant-cisco-secure-workload-introduces-state-of-the-art-persona-based-reporting-on-june-17-2024-at-1200-pm\/#primaryimage","url":"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2024\/06\/16716835-q9FUo8.gif","contentUrl":"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2024\/06\/16716835-q9FUo8.gif","width":1,"height":1},{"@type":"BreadcrumbList","@id":"https:\/\/jacksonholdingcompany.com\/stay-compliant-cisco-secure-workload-introduces-state-of-the-art-persona-based-reporting-on-june-17-2024-at-1200-pm\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/jacksonholdingcompany.com\/"},{"@type":"ListItem","position":2,"name":"Stay Compliant: Cisco Secure Workload Introduces State-of-the-art, Persona-based Reporting on June 17, 2024 at 12:00 pm"}]},{"@type":"WebSite","@id":"https:\/\/jacksonholdingcompany.com\/#website","url":"https:\/\/jacksonholdingcompany.com\/","name":"JHC","description":"Your Business Is Our Business","publisher":{"@id":"https:\/\/jacksonholdingcompany.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/jacksonholdingcompany.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/jacksonholdingcompany.com\/#organization","name":"JHC","url":"https:\/\/jacksonholdingcompany.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/jacksonholdingcompany.com\/#\/schema\/logo\/image\/","url":"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2023\/07\/cropped-cropped-jHC-white-500-\u00d7-200-px-1-1.png","contentUrl":"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2023\/07\/cropped-cropped-jHC-white-500-\u00d7-200-px-1-1.png","width":452,"height":149,"caption":"JHC"},"image":{"@id":"https:\/\/jacksonholdingcompany.com\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/posts\/3388","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/types\/post"}],"replies":[{"embeddable":true,"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/comments?post=3388"}],"version-history":[{"count":0,"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/posts\/3388\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/media\/3389"}],"wp:attachment":[{"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/media?parent=3388"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/categories?post=3388"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/tags?post=3388"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}