This week, Juniper Networks announced a new cloud-based threat intelligence service focused on fingerprinting attackers’ individual devices. We’d like to officially welcome Juniper to the cloud-based security intelligence market—a space where Cisco has a proven track record of leadership through Security Intelligence Operations (SIO). Imitation is indeed the sincerest form of flattery, but in Juniper’s case, they entered the market years late and with limited visibility.
Let’s take a closer look at Juniper’s latest offering.
To start, here is what we know for certain: cyber threats take advantage of multiple attack vectors, striking quickly or lurking for days, months and even years inside your network. Not only this, but the Cisco 2013 Annual Security Report showcases how the web is an equal opportunity infector, with cyber threats crossing national, geographic and organizational boundaries as quickly and easily as users can click on a link. Security solutions must understand the attacks and infrastructure they are launched from, with tracking individual hackers doing far less for your defenses than blocking malicious activity being actively distributed over the network.
The Problem of Visibility
When a detective walks onto a crime scene, they don’t just focus on one thing. The only way to understand an event is to look at the entire scene: interview witnesses, check the neighborhood and look into the history of everyone involved; in other words, context—or the “who, what, where and how” information using every available piece of data.
Just as a skilled investigator builds a holistic picture, security solutions are only as reliable as the intelligence they receive, with Juniper’s being limited by the number of “honeypots” across their customer base. In network security, focusing on a single piece of information, a single attack vector, or one delivery mechanism misses the global visibility and context needed to stop advanced attacks. Cisco SIO powers our security solutions, receiving over 100 terabytes of network intelligence across 1.6 million deployed web, email, firewall and IPS devices. We correlate this data from physical, virtual and cloud-based solutions with a world-class threat research team, augmenting all of this with an ecosystem of third-party contributors. Fingerprinting is one small tool you should deploy in your arsenal, even though it has limited utility and perhaps even limited accuracy.
Read More »
Tags: 2013 annual security report, attackers, attacks, cloud-based threat intelligence, cyber, cyber threats, malware, security intelligence, security intelligence operations, sio, targeted attacks, threat intelligence
It doesn’t seem like it’s been that long, but remember a couple of months ago when we were all reading articles like “5 ways technology will impact higher ed in 2013” about trends to watch in 2013? Well, at the beginning of the year, I highlighted four of those high-impact trends educators should be on the lookout for. Three of those trends were around the rise of the cloud, personal devices and flipped teaching, but one trend I’m really excited about is that of hybrid learning.
As new technologies begin to be used across campuses, educators are often challenged to find ways to best integrate the old with the new. As John Chambers recently said in his post around the Internet of Everything, “My perspective is that it’s best to accept change as inevitable – to embrace it, lead it, and use it to shape desired outcomes,” and that’s exactly what I think will happen with hybrid learning. Read More »
Tags: collaboration, edchat, edtech, highered, TelePresence, wharton school
There’s been a lot of buzz in the news and social media this week about working in the office vs. working remotely. While each company has to make decisions that are most appropriate for their own organization, Cisco has a very clear point of view on how and where employees can work – we support employees who work remotely or in the office. Central to this philosophy is our own technology which enables our global team to connect, communicate, collaborate and learn from wherever we are around the world -- be it Japan, India, France, Canada and almost 200 other countries.
Read More »
This is the third blog in the Cisco Partner Talent series, helping partners attract, develop, and retain the right people with the right skills at the right time. Last month’s blog shared talent attraction tips. This month’s blog post goes into detail about stage three of the Cisco Fit4Talent Employee Lifecycle: Onboarding.
Maybe I was wrong. Maybe he wasn’t so bad. Maybe we should get back together.
Many of us have thought something like this at some point in our lives. But you might be surprised to learn that your new employees are having these same thoughts about their previous organization—and often from day one on the job
In many cases, new employees haven’t broken their emotional ties with their previous employers, nor established new ties with you. Humetrics, a talent recruitment and retention specialist, recently conducted employee exit interviews on behalf of a client, and found that as many as 20 percent of that client’s employees would consider returning to their former employer.
The reason? They said that hadn’t yet developed an emotional attachment to their new employer. And having that emotional attachment is critical, according to Humetrics, because emotionally-connected employees are the predictor of business outcomes such as productivity, profitability, customer engagement and turnover.
How can Cisco Fit4Talent help partners?
Read More »
Tags: Cisco, Cisco Fit4Talent, fit4talent, onboarding, partner, talent
This has been an exciting week. Further expanding its Big Data portfolio, Cisco has announced collaboration with Intel, its long term partner, for the next generation of open platform for data management and analytics. The joint solution combines Intel® Distribution for Apache Hadoop Software with Cisco’s Common Platform Architecture (CPA) to deliver performance, capacity, and security for enterprise-class Hadoop deployments.
As described in my blog posting, the CPA is highly scalable architecture designed to meet variety of scale-out application demands that includes compute, storage, connectivity and unified management, already being deployed in a range of industries including finance, retail, service provider, content management and government. Unique to this architecture is the seamless data integration and management integration capabilities between big data applications and enterprise applications such as Oracle Database, Microsoft SQL Server, SAP and others, as shown below:
The current version of the CPA offers two options depending on use case: Performance optimized -- offers balanced compute power with I/O bandwidth optimized for price/performance, and Capacity optimized – for low cost per terabyte. The Intel® Distribution is supported for both performance optimized and capacity optimized options, and is available in single rack and multiple rack scale.
The Intel® Distribution is a controlled distribution based on the Apache Hadoop, with feature enhancements, performance optimizations, and security options that are responsible for the solution’s enterprise quality. The combination of the Intel® Distribution and Cisco UCS joins the power of big data with a dependable deployment model that can be implemented rapidly and scaled to meet performance and capacity of demanding workloads. Enterprise-class services from Cisco and Intel can help with design, deployment, and testing, and organizations can continue to rely on these services through controlled and supported releases.
A performance optimized CPA rack running Intel® Distribution will be demonstrated at the Intel Booth at O’Reilly Strata Conference 2013 this week.
Tags: Big Data, Cisco UCS CPA, CPA, Hadoop, HBase, Intel, NoSQL