\u0627\u0641\u0632\u0627\u06cc\u0634 \u0627\u0645\u0646\u06cc\u062a \u0633\u0627\u062e\u062a\u0627\u0631 \u0628\u0627 \u0646\u0648\u0622\u0648\u0631\u06cc \u0647\u0627\u06cc \u062c\u062f\u06cc\u062f<\/a><\/p><\/blockquote>\n\n\n\n\u0631\u062f\u06cc\u0627\u0628\u06cc \u0648 \u067e\u0627\u0633\u062e\u06af\u0648\u06cc\u06cc<\/h2>\n\n\n\nCisco Stealthwatch<\/h3>\n\n\n\n
\u06a9\u0633\u0628 \u0627\u0637\u0644\u0627\u0639 \u0627\u0632 \u0627\u06cc\u0646\u06a9\u0647 \u0686\u0647 \u06a9\u0633\u06cc \u062f\u0631\u0648\u0646 \u0634\u0628\u06a9\u0647 \u0628\u0648\u062f\u0647 \u0648 \u0686\u0647 \u06a9\u0627\u0631\u06cc \u062f\u0631 \u0634\u0628\u06a9\u0647 \u0627\u0646\u062c\u0627\u0645 \u062f\u0627\u062f\u0647 \u0627\u0633\u062a\u060c \u0628\u0627 \u06a9\u0645\u06a9 Telemetry \u0632\u06cc\u0631\u0633\u0627\u062e\u062a \u0634\u0628\u06a9\u0647 \u0627\u0645\u06a9\u0627\u0646\u200c\u067e\u0630\u06cc\u0631 \u0627\u0633\u062a \u0648 \u0634\u0646\u0627\u0633\u0627\u06cc\u06cc \u062a\u0647\u062f\u06cc\u062f\u0627\u062a \u0648 \u067e\u0627\u0633\u062e\u06af\u0648\u06cc\u06cc \u0633\u0631\u06cc\u0639 \u0628\u0627 \u0631\u0627\u0647\u06a9\u0627\u0631\u06cc \u0645\u0642\u06cc\u0627\u0633\u200c\u067e\u0630\u06cc\u0631 \u0628\u0631\u062e\u06cc \u062f\u06cc\u06af\u0631 \u0627\u0632 \u0627\u0645\u06a9\u0627\u0646\u0627\u062a \u0627\u06cc\u0646 \u0641\u0646\u0627\u0648\u0631\u06cc \u0645\u06cc\u200c\u0628\u0627\u0634\u062f.<\/p>\n\n\n\n
Cisco Threat Response<\/h3>\n\n\n\n
\u062e\u0648\u062f\u06a9\u0627\u0631\u0633\u0627\u0632\u06cc \u06cc\u06a9\u067e\u0627\u0631\u0686\u0647\u200c\u0633\u0627\u0632\u06cc \u062f\u0631 \u062a\u0645\u0627\u0645\u06cc \u0645\u062d\u0635\u0648\u0644\u0627\u062a \u0627\u0645\u0646\u06cc\u062a\u06cc Cisco \u0628\u0647 \u0645\u0646\u0638\u0648\u0631 \u0634\u062a\u0627\u0628\u062f\u0647\u06cc \u0628\u0647 \u0631\u062f\u06cc\u0627\u0628\u06cc\u060c \u0628\u0631\u0631\u0633\u06cc \u0648 Remediation \u0627\u0632 \u0642\u0627\u0628\u0644\u06cc\u062a\u200c\u0647\u0627\u06cc \u0627\u0635\u0644\u06cc Cisco Threat Response \u0627\u0633\u062a.<\/p>\n\n\n\n
\u06af\u0633\u062a\u0631\u0634 \u0648 \u0627\u06cc\u062c\u0627\u062f \u062d\u0641\u0627\u0638\u062a<\/h3>\n\n\n\n
Duo\u060c Tetration \u0648 SD-Access \u0633\u0647 \u0645\u062d\u0635\u0648\u0644 \u0627\u0635\u0644\u06cc \u0628\u0631\u0627\u06cc \u0627\u0645\u0646\u06cc\u062a \u0646\u06cc\u0631\u0648\u06cc \u06a9\u0627\u0631\u060c \u0633\u0631\u0648\u06cc\u0633\u200c\u062f\u0647\u06cc \u0648 \u0645\u062d\u06cc\u0637 \u06a9\u0627\u0631 \u0647\u0633\u062a\u0646\u062f. \u0647\u0645\u0686\u0646\u06cc\u0646 Cisco Zero Trust \u0628\u0627 \u0627\u06a9\u0648\u0633\u06cc\u0633\u062a\u0645 \u0645\u062d\u0635\u0648\u0644\u0627\u062a \u062f\u06cc\u06af\u0631 \u06cc\u06a9\u067e\u0627\u0631\u0686\u0647\u200c\u0633\u0627\u0632\u06cc \u0645\u06cc\u200c\u0634\u0648\u062f \u062a\u0627 \u0628\u0631\u0627\u06cc \u0647\u0631 \u0633\u0627\u0632\u0645\u0627\u0646 \u0627\u0645\u0646\u06cc\u062a \u06a9\u0627\u0645\u0644 Zero-Trust \u0631\u0627 \u0641\u0631\u0627\u0647\u0645 \u0646\u0645\u0627\u06cc\u062f.<\/p>\n\n\n\n
\u06af\u0633\u062a\u0631\u0634 \u0628\u0647 \u0647\u0631\u06af\u0648\u0646\u0647 \u06cc\u06a9\u067e\u0627\u0631\u0686\u0647\u200c\u0633\u0627\u0632\u06cc<\/h3>\n\n\n\n
\u0647\u0645\u06a9\u0627\u0631\u06cc\u200c\u0647\u0627\u06cc \u0641\u0646\u06cc Cisco \u0628\u0627 \u0641\u0646\u0627\u0648\u0631\u06cc\u200c\u0647\u0627\u06cc \u0645\u062e\u062a\u0644\u0641 \u0627\u06cc\u062c\u0627\u062f \u0634\u062f\u0647 \u062f\u0631 \u0627\u06cc\u0646 \u0634\u0631\u06a9\u062a \u06cc\u06a9\u067e\u0627\u0631\u0686\u0647\u200c\u0633\u0627\u0632\u06cc \u0627\u0645\u0646\u06cc\u062a \u0628\u0627 \u067e\u0644\u062a\u0641\u0631\u0645 \u0645\u0648\u062c\u0648\u062f \u0631\u0627 \u0622\u0633\u0627\u0646 \u0645\u06cc\u200c\u0633\u0627\u0632\u062f.<\/p>\n\n\n\n\n \u0647\u0631\u06af\u0648\u0646\u0647 \u067e\u0644\u062a\u0641\u0631\u0645 \u0645\u062f\u06cc\u0631\u06cc\u062a\u06cc <\/strong>Endpoint<\/strong><\/p>\n<\/td>\n \u0647\u0631\u06af\u0648\u0646\u0647 \u067e\u0644\u062a\u0641\u0631\u0645 \u0632\u06cc\u0631\u0633\u0627\u062e\u062a\u06cc<\/strong><\/p>\n<\/td>\n \u0647\u0631 <\/strong>Third-Party<\/strong><\/p>\n<\/td><\/tr><\/thead>\n \u0645\u062d\u0627\u0641\u0638\u062a \u0627\u0632 \u0647\u0631\u06af\u0648\u0646\u0647 \u067e\u0644\u062a\u0641\u0631\u0645 \u0645\u062f\u06cc\u0631\u06cc\u062a\u06cc Endpoint \u0648 \u06cc\u06a9\u067e\u0627\u0631\u0686\u0647\u200c\u0633\u0627\u0632\u06cc \u0628\u0627 Microsoft, Symantec, VMware, MobileIron, Jamf \u0648 \u063a\u06cc\u0631\u0647 .<\/p>\n<\/td> | \n \u06cc\u06a9\u067e\u0627\u0631\u0686\u0647\u200c\u0633\u0627\u0632\u06cc \u0628\u0627 \u0647\u0631 \u067e\u0644\u062a\u0641\u0631\u0645 \u0632\u06cc\u0631\u0633\u0627\u062e\u062a\u06cc \u0645\u0627\u0646\u0646\u062f Google, Kubernetes, Microsoft Azure, Amazon Web Services (AWS), Vmware \u0648 \u063a\u06cc\u0631\u0647.<\/p>\n<\/td> | \n \u06a9\u0627\u0631 \u0628\u0627 Third-Party\u0647\u0627 \u0645\u0627\u0646\u0646\u062f \u0633\u06cc\u0633\u062a\u0645\u200c\u0647\u0627\u06cc \u0627\u0631\u0627\u0626\u0647 \u062f\u0647\u0646\u062f\u0647 \u0647\u0648\u06cc\u062a \u0648 \u0627\u0637\u0644\u0627\u0639\u0627\u062a \u0627\u0645\u0646\u06cc\u062a\u06cc \u0648 \u0645\u062f\u06cc\u0631\u06cc\u062a \u0631\u0648\u06cc\u062f\u0627\u062f\u0647\u0627 (Security Information and Event Management) \u06cc\u0627 \u0628\u0647 \u0627\u062e\u062a\u0635\u0627\u0631 SIEM \u0645\u0627\u0646\u0646\u062f Exabeam, Okta, Splunk, IBM, Google, Dell, Ping Identity, Oracle \u0648 \u063a\u06cc\u0631\u0647.<\/p>\n<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n \u0645\u0637\u0644\u0628 \u0645\u0631\u062a\u0628\u0637:<\/strong><\/span> \u0645\u0639\u0631\u0641\u06cc \u0646\u0633\u0644 \u062c\u062f\u06cc\u062f Zero Trust<\/a><\/p><\/blockquote>\n","protected":false},"author":1002946,"featured_media":0,"parent":0,"menu_order":0,"template":"","format":"standard","manualknowledgebasecat":[2970],"manual_kb_tag":[8590,8588,3578,8589],"class_list":{"0":"post-19578","1":"manual_kb","2":"type-manual_kb","3":"status-publish","4":"format-standard","6":"manualknowledgebasecat-security","7":"manual_kb_tag--cisco-zero-trust","8":"manual_kb_tag-cisco-zero-trust-","9":"manual_kb_tag-3578"},"yoast_head":"\n\u0631\u0627\u0647\u06a9\u0627\u0631 Cisco Zero Trust \u0686\u06cc\u0633\u062a \u0648 \u0686\u0647 \u0642\u0627\u0628\u0644\u06cc\u062a \u0647\u0627\u06cc\u06cc \u062f\u0627\u0631\u062f\u061f<\/title>\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\t\n
| | | |