VIDEO: Introduction to Elisity Cognitive Trust, Before the Demo.
Simplicity and fast speed-to-value!
The solution architecture can leverage pre-existing investments in switches by turning them into intelligent policy enforcement points with the use of containers and it makes use of hypervisors where edge computing is not available.
Cognitive Trust passively gleans and continuously verifies the identity of devices, users, and applications traversing the network, to enforce policies as close to the assets as possible. It integrates with user, application, and device identity sources so organizations can very quickly gain visibility into network assets and traffic flows, assess risks, and begin building policies enforced at OSI L2/ L3/L4, to secure resources from malicious network traffic.