Cisco Blogs


Cisco Blog > Security

Filtering Explicit Content

Many web sites provide a setting to reduce the amount of explicit, or objectionable, content returned by the site. The user configures these settings, but many users are unaware such a setting exists, or that it needs to be set for each web site. Additionally, the security administrator cannot audit that users have configured the setting. As a result, users can be exposed to objectionable content or can inadvertently trigger filtering of objectionable content on the Cisco security service (Cisco WSA or CWS), sometimes causing uncomfortable questions from human resources or from management.

An emerging standard defines a new HTTP header, “Prefer: Safe,” which does not require the user to configure each web site. This feature is implemented by Firefox, Internet Explorer 10, and Bing. We anticipate more clients and more content providers will support this emerging standard.

Both Cisco Web Security Appliance (WSA) and Cloud Web Security (CWS) support this emerging standard, and can be configured to insert this header on behalf of HTTP and HTTPS clients. In this way, the security administrator can cause all traffic to default to avoiding explicit or objectionable content, without relying on users to configure their browser or to configure each visited web site.

Tags: , , , , , ,

Application Enablement and Innovation Leveraging Linux Containers

Linux containers and Docker are poised to radically change the way applications are built, shipped, deployed, and instantiated. They accelerate application delivery by making it easy to package the dependencies along with the application. That means that a single containerized application can operate in different development, test and production environments and platforms (physical and virtual). While the concept of containerization is not new, the benefit of using containers to pull together all the application components (including dependencies and services) into a package for application portability is. As continuous integration and delivery require a very agile Software Development Lifecycle (SDLC) process to move from development to production, containers provides the perfect abstraction to deploy and test across the various platforms. Application containers make it very easy for applications to be deployed on bare metal servers, virtual machines, and public clouds. The reason why containers are relevant Read More »

Tags: , , , , , , ,

Statement of Dan Lang on Nomination of Daniel Marti as U.S. Intellectual Property Enforcement Coordinator

Yesterday, President Obama nominated Danny Marti as U.S. Intellectual Property Enforcement Coordinator.  I welcome this nomination to this critical role in protecting American intellectual property and our innovation economy.   A thoughtful and balanced approach is needed to both deter copying of American innovation and prevent financial opportunists from gaming the system.   We expect that Mr. Marti, when confirmed, will be a champion of a balanced and effective intellectual property system.

Converged Access Enables “Perfect Branch” at CSC and ENVEN

Raj CSCCorporation Service Company (CSC) and ENVEN are deploying Converged Access with Catalyst 3850 switches in their branch offices to build single platforms for their wired and wireless networks. The in-built wireless controller in Catalyst 3850 eliminates the need for an external WLAN controller and brings wired features like Secure Group Tags, Flexible Netflow and Wireshark to the wireless networks.

Converged Access is a WLAN deployment mode that helps deliver common intelligent services across wired and wireless networks for security and policy, application visibility, network resiliency, smart operations and more. Catalyst 3850, Catalyst 3650, Catalyst 4500E switches, and Cisco 5760 WLAN Controllers (WLC) are capable of supporting Converged Access mode. Read More »

Tags: , , ,

Midsize Auctioneer’s Network is Fast and Fortified as Hundreds of Clients Bid Billions

Forget the best of both worlds. Ritchie Bros Auctioneers have found the best of three worlds with their network. This midsize company enables fast, secure bidding for customers, provides hassle-free mobile access for employees, and detailed network reports with no effort for IT.

Ritchie Bros. Auctioneers is the world’s largest auctioneer of heavy equipment and trucks. They sell billions of dollars of unused and used equipment at hundreds of unreserved public auctions each year. What’s even more impressive is that they are able to do this with only 1300 employees worldwide.

Auctions are very time sensitive and require a synchronized effort. This leaves little room for errors and interruptions.  Read More »

Tags: , , , , , , , , , , , , , , , , , , , , ,