Cisco Blogs


Cisco Blog > Security

Identity and Device Aware IT Platforms Make Life Easier

Life is generally a lot easier when you have all the facts.  Especially if those facts are actually accurate.  Nowhere does this ring more true than in the life of an IT professional.

Often times a day in an IT shop is a lot like that grade school game of telephone where information gets passed down the line but gets distorted (or is just plain wrong) because no single player has the complete context.  This scenario gets played out everyday in the IT infrastructure where siloed operations, monitoring and policy platforms only work from the information they possess.  But that information is generally just a snapshot viewed through the bias of that system’s siloed purview.  As a result, mistakes get made, security is substandard or perhaps even dysfunctional, and everything from configuration to event management and investigation takes far longer than it should.  Net-net – time is wasted, costs increase, and many things still don’t work that well.  Read More »

Tags: , , , , , ,

Everything’s in the Cloud: Now What?

Today’s applications are either virtualized in our own data center or being hosted by any number of providers. But is our security built around our current security reality or is it living in the past? During one of my Gartner Security & Risk Management Summit presentations, I shared best practices in a rapidly changing environment, where cloud vendor hype isn’t matching our security reality. Now that everything is in the cloud, we need a strategic approach to cloud security.

 

Here’s how to make it happen:

Ensure safe data handling when working with cloud provider. Considering cloud providers are an extension of your business, it is vital to ensure how your provider handles security for storing and transmitting your data. What provisions are in place to make sure data is secure once it has been transmitted? Determine if your provider has firewalls, data encryption, and user authentication to keep your data safe.

Combat growing threats. As cloud-based technologies grow more sophisticated over time, so do the possibilities of threats. A proactive approach to security means that we enable technology like cloud-based threat intelligence to detect a threat as they happen – or in some cases before they happen. Other anti-threat measures such as deep packet inspection and proactive monitoring can also help combat viruses, spam and other intrusions. Learn more. You don’t have to be a security expert to take security seriously. Leverage industry bodies, like the Cloud Security Alliance, for guidance on benchmarking service provider security capabilities. Learn what certifications and security practices your cloud provider has, including daily risk audits. And look for ways to increase security processes when you work with cloud providers. See how Cisco can help you protect your business assets and meet compliance requirements.

Learn more. You don’t have to be a security expert to take security seriously. Leverage industry bodies, like the Cloud Security Alliance, for guidance on benchmarking service provider security capabilities. Learn what certifications and security practices your cloud provider has, including daily risk audits. And look for ways to increase security processes when you work with cloud providers. See how Cisco can help you protect your business assets and meet compliance requirements.

To know more follow me on Twitter  @e_desouza  and check my blog and Gartner presentation  on Three Data Center Security Innovations to Accelerate Your Business

Tags: , , , , , , , , , , ,

WWDC Wireless Takeaway: 802.11ac on Apple Devices Coming Your Way Soon

At WWDC this week, Apple announced that their new Macbook and Macbook Air are 802.11ac enabled. As we predicted in our red-hot Client Adoption blog earlier this year, the list of 802.11ac clients, like the new Macbooks and Samsung Galaxy S4, will continue to grow and expand throughout 2013. These devices come with the promise of Gigabit wireless, at faster speeds and better performance. How will your enterprise networks meet those expectations? The Cisco Aironet 3600 with 802.11ac module is your ticket for enterprise-class 802.11ac wireless.

3600_module-300x240

Cisco Aironet 3600 AP with 802.11ac module

The 802.11ac module will make these new clients fly at new higher speeds--3 to 4 times faster than 802.11n. So if you are connecting your new Apple device to an Enterprise Network supporting Cisco’s 3600 AP with the 802.11ac module, you will be able to get some of the highest bandwidth rates ever seen out of your Wi-Fi network which will open the opportunity for better quality video streams, better online collaboration and the support of more high-bandwidth demanding applications.  Check out the Aironet 3600 here:  http://www.cisco.com/en/US/products/ps13128/index.html

Can’t get enough of 802.11ac? Neither can we. Read More »

Tags: , , , , , , , , , , , , ,

Cisco Sponsors Regeneration Roadmap Webcast: How Can Business Provide Leadership for Sustainable Development

June 12, 2013 at 2:50 pm PST

Join us tomorrow, as Cisco sponsors the launch of Changing Tack, the final report of the Regeneration Roadmap, via global webcast from 8:00 to 9:30 a.m. PDT (11 a.m. EDT/4 p.m. London)

The Regeneration Roadmap is a collaborative, joint initiative by GlobeScan and SustainAbility designed to advance sustainable development.  What is “sustainable development?” It is defined by a United Nations commission as development that “meets the needs of the present without compromising the ability of future generations to meet their own needs.” In business, this equates to people and production practices that are good for society and the environment, as well as the bottom line. 

The aim of the Regeneration Roadmap is  to provide a roadmap for achieving sustainable development within the next generation, focusing in particular on ways the private sector can improve sustainability strategy, increase credibility and deliver results at greater speed and scale.

regeneration_roadmap_changing tack

The Changing Tack report released today holds that choices made on sustainable development now will shape success or failure in future. It also demands that business leaders commit to doing more to guarantee that present and future societies and ecosystems thrive.

Read More »

Tags: , , ,

Enterprise Networks: What’s the Attraction with Abstraction?

ONE Enterprise Networks Architecture GameChangerIf you have ever been to a large resort, you may find yourself amazed at the number of restaurants, clubs and shops that are on the property. On the other hand you may find yourself constantly wandering around the property to find a particular place you had in mind or having to stop at every directory kiosk on the way to make sure you weren’t lost. What if there was a better way?

With the Cisco ONE Enterprise Networks Architecture the control layer can abstract information from the network infrastructure. But what does this mean from the perspective of delivering a better end-user experience or even helping in driving business? Let’s look at an example of how the network infrastructure is helping drive change in the hospitality industry.  Read More »

Tags: , , , , ,