Looking into the crystal ball, I see that video collaboration will not be just about faces on screens, especially for GenY and the young executive. It’s about customizing and manipulating video so that it becomes additive to the business and decision-making process – making the user smarter because of it and the experience “better than being there.”
A recent survey of up-and-coming young executives found effectiveness to be a key driver for visual collaboration. Namely, respondents said they want to be able to see the visual cues that aid in effective communications, to appear present in a meeting, to quickly edit and share video content, and to be able to collaborate on content as if they and their globally-disparate teams are all in the same room. And they want it deployed pervasively.
These requirements are moving visual collaboration from the nice-to-have bucket to the critical-business-tool bucket. Young executives will expect video to be embedded in mission-critical business applications, much in the same way that email, IM and mobility are today, accessible from wherever they are – Starbucks to the boardroom – and on the device of their choosing. Read More »
Let’s face it – data center network management is a complex ordeal. IT infrastructure is even becoming more complicated as network virtualization, VM mobility, multiple networking models, multi-tenancy, hybrid cloud environments, and networking scalability evolve. But luckily for network admins, there are solutions to help simplify and solve these challenges by automating frequent changes to complex data center networks.
A key software component for each of these solutions is our control point for network services deployment, with template-oriented policy management. That control point and management interface is Cisco Prime Network Services Controller (formerly VNMC).
How does Prime Network Services Controller help? The graphic below shows the vision and some of the key use cases for this software, including:
Cisco Prime Network Services Controller is the main control point and management software for Nexus 1000V InterCloud, providing VM workload mobility between enterprise data centers (e.g. private clouds) and a cloud service provider (e.g. public clouds),
It is the interface for Cisco’s network security stack (including Nexus 1000V, ASA 1000V & Virtual Security Gateway [VSG] firewalls) using dynamic template-oriented policy management,
And finally, it controls network services insertion (e.g. firewalls, load balancers) when provisioning or migrating VMs.
If you are headed to San Francisco for VMworld U.S. next week, come visit the Cisco booth to see these solutions in action. Here are some of the demos that we’ll be featuring:
Building Hybrid Clouds with Nexus 1000V InterCloud: We’ll be showcasing one of the most exciting features in the latest version of Prime Network Services Controller. Come see us deploy a secure network tunnel between your enterprise data center to the public cloud with this solution.
Virtualized Network Services: This demo will feature Prime Network Services Controller and vPath integration with Citrix NetScaler 1000V and Imperva SecureSphere running on Cisco Nexus 1000V series switches (on VMware vSphere, of course).
And don’t miss our theatre session on August 27th, 5:00PM PST in the Cisco booth.
For a preview of what you’ll see, watch this video on Prime Network Services Controller with product manager Dedi Shindler from Cisco Live earlier this summer:
UPDATE: Due to low registration numbers for our training, Cisco Network Threat Defense, at SecTor 2013 we unfortunately had to cancel our course. For those who registered, we appreciate your support and look forward to meeting and delivering the training to you at another venue in the near future.
SecTor 2013, the seventh annual security conference in Toronto, Ontario, CA, will be held October 7-9 at the Metro Toronto Convention Centre in downtown Toronto. The conference provides an unmatched opportunity for IT and Security Professionals to learn the latest security research and techniques. My colleague, Joe Karpenko and I will present Network Threat Defense Hands-on Training on October 7.
Our training will help you learn about securely deploying network services and to detect, classify, and prevent threats targeting a network. You will use Cisco network devices to configure and deploy advanced IPv4 network threat defenses and countermeasures. Once these defenses and countermeasures have been implemented, you will then validate the effectiveness of the defenses and adjust them to changing network conditions and attack profiles. This will help you to verify, measure, and update your defenses for real world threats.
Cisco is a proud sponsor, as well as training provider, and can save you 10% using discount code ‘CISCO-2013′ or ‘CISCO-Expo2013′ for a free expo pass! Registering for the full conference also provides an additional $100 discount towards training courses.
Please join us at SecTor 2013 in October. Register soon for discounted pricing. Please reach out with questions and we look forward to seeing you in Toronto!
When I think of a traditional elementary or secondary classroom, I think of colorful bulletin boards, desks, pencils and neat piles of books and paper. As students all over the country return back to school, it’s interesting to think about how the classrooms we enjoyed as students (back in the day!) have evolved to include electronic white boards, tablets and other high-tech collaboration tools.
While this technology has fundamentally changed the landscape of the modern classroom, the Internet of Everything is driving education-focused start-ups to enable more connections in and outside the classroom than ever before. Here’s a look at a few start-ups that are revolutionizing how students, teachers and parents connect and learn.
How well do you know your mobile worker? Understanding the mobile worker’s perceptions and behaviors will offer a better view on the potential security implications your organization must manage. Cisco recently released a new global infographic and white paper, the Cisco Connected World International Mobile Security study. They explore the mobile worker’s view points concerning working remotely, connecting to corporate, and their sense of security. Some of the findings are worth reflecting on to help you set the course for your mobile security efforts.
There is no question that the movement to mobile personal devices in the workforce has been well recognized. A recent response to this trend includes almost half of employers offering to fund workers to buy their own devices. Allowing the “chose your own” device alternative will attract and retain talent and reduce costs (see recent IBSG BYOD research), but what are the security implications?
There are a few striking data points to call out:
63% of users download sensitive data on their devices. The frequency significantly increases in some countries which should alarm people doing business internationally if there are no precautions taken to secure the downloaded data. Imagine your financial data or product road maps being downloaded on an unprotected personal device.
Most believe remote access is a privilege. Yet in some countries they believe it’s a right as a worker. This establishes high expectations for IT to support and secure the devices including, but not limited to, extensive help desk calls.
Most users are diligent when a pop-up appears and will read through the details and determine what it really means. Yet, many workers from select countries generally tend to be less careful and accept warning pop-ups without reading the details which increases the risk that hidden malware will be downloaded. Hackers depend on this social mining effort.
60% of users admit to engaging in risky behavior on a device (for example, personal or company-owned) while connected to corporate resources. This suggests that more security enforcement technology would benefit the prevention of data breaches and/or loss.
So, who really owns the mobile security issue? Mobile workers do not take full responsibility for a safe device with 84% believing that their IT will protect them from threats no matter what device is used. Sometimes IT’s perspective on this dependency is expressed with disbelief. An example of this issue was observed at BlackHat from a security professional during a demonstration we presented a couple weeks ago.
During the demonstration, we were showing how a user who inadvertently clicked on a phony URL sent in an email. That click triggered to phone an alert to a hacker that an “innocent” user is accessing the phony Internet site. The user unknowingly offered login credentials to their bank account. The hacker begins to record the users’ keystrokes to use later for malicious purposes. A security professional from BlackHat chimes in during the demonstration with the comment, “Dumb User.” The demonstration later showed how the combined effort of Cisco ISE and SIEM (Lancope) with unique TrustSec enforcement can identify and control the malicious activity with a single policy (for example, by segmenting and restricting users traffic close to the edge—on a network switch). The surprise to the security experts watching the demonstration was the concept that the network switch provided this enforcement.
Bottom Line: Most mobile workers have good intentions but do rely on IT to step in.
It would be great hear from you on your impressions of these recent findings and whether you are a mobile worker or an IT professional.
Please refer to Cisco’s security response for the mobile workforce: Secure Access