Cisco Blogs


Cisco Blog > Data Center and Cloud

#InnovateThink TweetChat on Friday, September 19 at 10 a.m. PST: The Way Forward for IT Innovation

In the hyper-competitive Internet of Everything (IoE) era, every company must be ready for rapid innovation, sudden market transitions and ever-changing security threats.

But IoE — the explosion in network connections among people, process, data, and things — is about far more than vexing challenges. It is also about tremendous opportunity: Cisco predicts a staggering $19 trillion in IoE-related Value at Stake over the next decade.

The IT organization has a critical role to play in helping companies  capture these staggering opportunities by driving innovation and enabling business agility and growth.

But where does your organization stand in the overall scheme of IT evolution? To what extent is mounting IoE complexity hindering growth? And what kind of IT model is needed support your company’s efforts to innovate and compete at the hyperspeed of the IoE era?

FastIT TweetI invite you to explore all of these topics and more with me on an upcoming TweetChat on Friday, September 19 at 10 a.m. PST. Join the conversation by using #InnovateThink and #FutureOfIT. We will discuss the current state of IT, its challenges and pain points, and how it can enable business innovation. We will also discuss the solution: Fast IT.  

Fast IT is the way forward. It offers immediate steps toward building a more agile, secure, application-centric infrastructure. And transforming the IT organization into a force for rapid innovation and competitive edge. Fast IT is the IT operating model for the Internet of Everything era. Cisco recently released a major global study of Fast IT — how it can address some of the toughest challenges facing IT today, and show the way forward.

By implementing a Fast IT model, organizations can:

  • Respond to supercharged IoE complexity with infrastructure that is application-centric, automated, and programmable.
  • Capture the full benefit of a far-flung “fabric of clouds,” moving seamlessly across even the most extensive hybrid-cloud ecosystems
  • Drive the necessary organizational changes that will raise IT to the status of trusted advisor to the business and a true partner in innovation
  • Reap the benefits of a 20 to 25 percent reduction in costs, which can then be reinvested in new capabilities to drive innovation and business outcomes
  • Meet an ever-expanding threat landscape with dynamic, policy-driven security solutions

 

Tags: , , ,

Dynamic Cyber Attacks Call for Dynamic Controls

Last month’s earthquake in Napa Valley got me thinking. In earthquake-prone areas, new construction is being built to move dynamically to withstand shocks and tremors. Innovative materials and designs sway and bend to provide better protection. But older buildings based on traditional, static design concepts can suffer devastating damage in an earthquake and its aftershocks.

It’s similar to the journey we’re on in the security industry, which is scaling to better address the harsh realities we face as defenders. At Cisco, we track this journey through a scale of controls we refer to as  the Security Operations Maturity Model, which moves from static to human intervention to semi-automatic to dynamic and, ultimately, predictive controls. I will talk more about this scale in the coming weeks, but for now, let’s focus on the need for most organizations to shift to dynamic controls.

We all know that the security landscape is constantly evolving and attackers are innovating in lockstep with rapid changes in technology. In fact, as I talk with security professionals daily about the challenges they face, a few consistent points come up:

  • As new business models are built on innovations in mobility, cloud, the Internet of Things (IoT) and Everything (IoE), security solutions and processes must become more dynamic and more scalable to keep up with the change;
  • Further, as hacking has matured and become industrialized, the security models used to defend need to mature as well; and
  • Finally, there’s too much complexity, fragmentation, and cost in legacy security deployments.

A recent malicious advertising attack called “Kyle and Stan”, discovered by our Talos Security Intelligence and Research Group, demonstrates the challenges defenders are up against -- read their full post here. Posing as legitimate advertisers, cybercriminals contact the major advertisement networks to try to get them to display an ad with a malicious payload packed inside of legitimate software – spyware, adware, and browser hijacks, for example. They target popular websites and instruct the companies to run the ad for just a few minutes, leaving little or no time for the ad content to be inspected. In this case, malvertising victims were faced with an often-unprompted download of what appeared to be legitimate software with a hidden malicious payload. The malware droppers employ a range of clever techniques to continuously mutate in order to avoid detection by traditional, point-in-time systems.

Read More »

Tags: , , , , , , , ,

Overlap of communication and computation (part 1)

September 16, 2014 at 5:00 am PST

I’ve mentioned computation / communication overlap before (e.g., here, here, and here).

Various types of networks and NICs have long-since had some form of overlap.  Some had better quality overlap than others, from an HPC perspective.

But with MPI-3, we’re really entering a new realm of overlap.  In this first of two blog entries, I’ll explain some of the various flavors of overlap and how they are beneficial to MPI/HPC-style applications.

Read More »

Tags: ,

Introducing the Industry’s First Threat-Focused Next-Generation Firewall

Cisco is a strong proponent for shifting the mindset regarding the capabilities a Next-Generation Firewall (NGFW) must provide to stay relevant in a world that is dealing with dynamic threats. While nothing is technically wrong with legacy NGFWs, much is wrong with their approach.

To meet current and future needs, a NGFW must now provide full visibility and contextual awareness across applications, hosts, and the network, address dynamic threats, quickly correlate and identify multi-vector threats and deliver the dynamic controls organizations now require to combat advanced threats. It must do all of this while reducing complexity. These capabilities are crucial for enabling continuous protection across the attack continuum—before, during and after an attack.

Read More »

Tags: , , , , ,

Delivering Better Transportation Solutions In a Connected World With Cisco IoE

Cisco ITS WC boothFord, GM, Honda, Toyota, the U.S. Department of Transportation.  It’s no surprise why they were front and center at the Intelligent Transportation Systems (ITS) World Congress which wrapped up in Detroit last week.   But, Cisco?

Barry Einsig, Cisco Transportation Executive and John Gillan, Sales Relationship Manager for Cisco Advanced Services prepare for a customer meeting at ITS World Congress

Barry Einsig, Cisco Global Transportation Executive and John Gillan, Sales Relationship Manager for Cisco Advanced Services prepare for a customer meeting at ITS World Congress.

“Reinventing Transportation in our Connected World” was the theme of this year’s ITS World Congress, yet a question we heard all week was “what is Cisco doing here?”  As if right on cue, as the show came to a close, Connected World Magazine ranked Cisco as #1 on their prestigious Connected World CW 100 annual ranking of the top 100 elite technology leaders in connected devices.

Cisco has long been recognized as a leader in traditional IT and networking, but customers are starting to see how the Internet of Everything and the Internet of Things is driving a big transformation in transportation.  And, they trust Cisco to lead the way again.

Read More »

Tags: , , , , , , , ,