We’ve had an exciting year across the Collaboration portfolio, particularly as it relates to our endpoint products. Just one proof point: We shipped our 1 millionth 7800 Series IP phone last month, less than one year since its launch. A million units is not just a major milestone, but it’s the fastest ramp-up we have ever experienced for a new IP phone. And we’ve been shipping IP phones for more than 15 years.
But what’s even more exciting to me is how our technology is helping people. As adoption of voice and video collaboration technology continues, we’re evolving our portfolio to provide the flexibility and choice they need. Read More »
Tags: Cisco, collaboration, ip phone, IP Phone 7800 Series, IT, milestone, WebEX
Cisco IT is preparing our global WAN for employees’ growing use of third-party cloud services. Already we use more than 400 cloud services. The most popular are Cisco WebEx, Salesforce, SAP, and Office365. Read More »
Tags: Cisco IT, cisco on cisco, cloud, coc-enterprise-networks, EN, enterprise networks, IT, WAN
As an IT security practitioner, you have a lot on your plate. Malware attacks are ever present. Hackers are smarter than ever and have the resources and persistence to compromise your organization. The malware being created today is more sophisticated. And the number and types of devices being used in the workplace are expanding, which is increasing the attack surface for malware delivery. With all of these new endpoints being used in the workplace, it’s no surprise that more than 70% of respondents in the 2014 State of Endpoint Risk study by Ponemon say that endpoint security risk is more difficult than ever to manage. Without visibility into potential malicious activity on the endpoints, how are you expected to effectively defend against an attack launched from an endpoint?
Let’s face it: endpoints are everywhere now. The definition of an endpoint has expanded vastly from its first iteration as a tethered desktop computer. We have Windows and Mac laptops; tablets and smartphones; virtual environments; and now even smart watches. We rely on these devices every day. Furthermore, with the advent of the Internet of Everything (IoE), the number and variety of connected devices are set to explode. Cisco estimates that as many as 50 billion devices will be connected to the network by the end of the decade.
The number of attacks targeting these devices is on the rise. In the same Ponemon study, 68% of respondents reported that their mobile endpoints have been the target of malware in the last 12 months. Examples are plentiful. A user with a personal Android phone that has been infected with malware plugs the phone into the office computer to charge it and the malware infiltrates the corporate network. An employee connects their work laptop to their home wi-fi connection and malware lying dormant seizes the opportunity to launch an attack through the back door. Someone surfing the web visits a legitimate website and clicks on an ad that is actually infected. Third-party applications downloaded from seemingly reputable sites can also introduce security risks.
Attackers understand how to exploit these gaps in protection that a proliferation of endpoints can create and work relentlessly to drive their attacks home. Their attacks are dynamic and multidimensional and require continuous scrutiny. As an IT security practitioner, you can’t protect what you can’t see. You need security solutions on the endpoint that couple continuous visibility and control so that you can not only see what’s happening on all of the endpoints on your extended network, but have the power to stop an outbreak quickly if an attack gets through.
Cisco Advanced Malware Protection (AMP) for Endpoints gives you unmatched visibility and control on endpoints, including PCs, Macs, mobile devices, and virtual environments. AMP is continuously monitoring activity on your endpoints, recording everything that it sees, which gives you the ability to roll back time on would-be attackers. When a file starts behaving badly, AMP is there to catch it, and gives you detailed information on how the malware got there in the first place, where it has gone, what other systems have been affected, and what exactly the malware is doing. With this information on root cause and point-of-entry, the complete ancestry and lifecycle of the file, and detailed analysis on the malware’s activity, you can surgically remediate malware from all of the affected areas on your endpoints and extended network. Whether you’re dealing with endpoints connected to a protected network or roaming on public or personal in-home wi-fi, AMP provides you with continuous and integrated detection, response, and remediation capabilities. Download this whitepaper to learn more about a new model to protect the endpoint.
To learn more about AMP for Endpoints, visit www.cisco.com/go/amp
 Cisco Internet of Things: http://www.cisco.com/web/solutions/trends/iot/indepth.html
Tags: Advanced Malware Protection, AMP, security
According to Dr. Barry Devlin, amongst the foremost authorities on business insight and one of the founders of data warehousing, “Data without context is meaningless. It is also valueless. Without a well-understood business context, any derived information and subsequent decisions are open to multiple interpretations or, worse, misinterpretation. It is the context—and, by extension, a Business Directory that manages this context— that promotes the value and virtue of data.”
Data, Data Everywhere, Self-Service BI Can Help
Businesses that successfully leverage their data will be the leaders. Those who don’t will fall behind.
However analytics, big data, the cloud and the Internet of Everything are are drastically changing today’s data landscape. Gone are the days when business users would ask for information and wait patiently for IT to modify the data warehouse and then write the new reports.
To gain the insights required for competitive success, business users today visualize and analyze data without IT’s help using a new class of easy-to-use, self-service business intelligence (BI) tools such as Qliktech, Spotfire, Pentaho and Tableau, as well as the increasingly powerful and ubiquitous Excel.
However finding and accessing that data remains a big challenge. From the business user point of view, data lacks proper business context, thus obscuring its relevance. Instead data is too distributed, too diverse, too IT-focused in how it is described, organized, and stored.
As with self-service BI for visualization and analysis, business users today are seeking self-service approaches to finding, understanding and accessing data. This requires not only new tools that provide data in a business context, but also a new approach to business and IT collaboration.
Business Directory -- Self-Service Data for Business
On October 1, 2014 at Data Virtualization Day 2014 in New York City, Cisco introduced Business Directory, as part of Cisco Information Server 7.0 (CIS 7.0), the latest version of our flagship data virtualization offering.
Business Directory is the first data virtualization offering designed exclusively for business self-service. Through a business context lens, users apply search and categorization techniques to quickly find and understand the data they’re looking for. From there, they can use their self-service BI tool of choice to query it. The result is far faster time to insight which translates to better business outcomes sooner.
With Business Directory, business and IT align the people, processes and technology for competitive success. IT provides secure, curated, business-context organized data sets to the business, with business adding domain knowledge and analytic value on the path to insight.
For a third party point of view on the benefits of Business Directory’s, download Dr. Barry Devlin’s recent white paper, Putting Data In Business Context: The Value and Virtue of a Business Directory.
To learn more about Cisco Data Virtualization, check out our page.
Join the Conversation
Follow us @CiscoDataVirt.
Tags: analytics, Big Data, Business Directory, Cisco Data virtualization, Cisco Information Server, cloud, Internet of Everything
Seven billion. That’s the number of mobile-connected devices that will be trying to get on networks this year. Now you’re probably not going to be hosting all 7 billion of them, so let’s try this number – 4. As in, “the average number of devices that enterprise users have” is roughly 4 devices*. Go ahead – do the math with your own employees. For Cisco, that’s around 250,000+ devices or so attempting to connect to our network. As a company, you may have more, you may have less…but the one thing you definitely have are employees who are eager to access your network with more of their own personal devices than ever before.
Great for employees, right? Absolutely. However, this, generally, gives enterprises two major dilemmas:
1) They lack any visibility into or context around who and what is getting on the network – Is it a smartphone? Is it a smartphone with the latest OS? Is it a smartphone supported by the enterprise?
2) They’ve lost the stringent control they used to have over what’s getting onto the networks. Sure – rules are defined for users, but maybe they’re not really being enforced. Or maybe “shadow IT” is just going around the rules to get someone’s new cracked Android tablet online.
This, generally, also gives network administrators heartburn…and for good reason. They’re stuck walking that fine line between security and productivity. How can they secure the enterprise and network access without making life miserable for their users…and themselves?
In our experiences here at Cisco, we’ve discovered that tackling these challenges requires a few things:
1) Find a way to accurately identify who and what is getting on the network
2) Centrally manage user access policy and use the identity to assign everyone the right network access
3) Make it easy for users to actually get onto the network – however they connect
4) Keep an eye on the network for threats and then quickly neutralize those threats.
If you can find a way to do each one of those things, you’ve taken a big first step in addressing these dilemmas.
Dynamic Control with Context
At Cisco, we’re helping organizations tackle these challenges every day with the Cisco Identity Services Engine (or “ISE”). Cisco ISE is an access policy platform that unifies and automates secure access control to network resources.
1) Accurate Identification – Cisco ISE grabs contextual data from a wide variety of sources (e.g., Active Directories, sensors, NetFlow) across the network to offer clear visibility into every connected device. It also offers advanced profiling technology as well as a curated profiling update service to ensure that all these connected devices are accurately identified and classified.
2) Centralized Access Policy – Cisco ISE gives enterprises the power to centrally define and manage the right types of access for users and devices. ISE can take written, granular business policy and make it real secure access policy, enforced across the network.
3) Easy Onboarding – New simplified onboarding experiences provide intuitive user access on branded portals, without sacrificing security, for a wide variety of enterprise deployments – from guest hotspot to “BYOD” projects.
4) Rapid Mitigation and Remediation – Cisco ISE can take all that collected contextual data and share it with integrated partner solutions. By delivering a deeper level of context, ISE makes it easier and faster to identify, mitigate, and take action to remediate non-compliant mobile devices, compromised endpoints, or other network threats.
Cisco ISE provides enterprises with greater visibility into who and what is on the network. This leads to more accurate identification, which, in turn, allows enterprises to assign the right access control to an end-user and device…easily and securely.
So, when that day comes where some of those 7 billion devices end up on YOUR network, you know you’ll be ready to tackle those challenges with Cisco ISE.
Please join us on November 5, 2014, for a live, 60-minute webcast where we’re offering a sneak peek at the newest version of Cisco ISE. Space is limited, so register today!
*Citrix, “Workplace of the Future: a global market research report”, September 2012 http://www.citrix.com/content/dam/citrix/en_us/documents/products-solutions/workplace-of-the-future-a-global-market-research-report.pdf
Tags: control, Easy Onboarding, Identity Services Engine, ISE, visibility