Cisco Blogs

Search Results

364 posts found

Understand how the Intercloud elegantly meets Public Sector IT requirements

…altogether – their journey to the cloud: Data sovereignty Budget reduction DC interconnection DevOps enablement Cyber Security Public worker re-skilling Supplier agility (fear of vendor lock-in) Cloud Service Brokerage Transparency and Trust To understand the nature of these requirements, as well as how the Intercloud is elegantly solving the issues, I invite you to read our recent white paper titled “Understand how the Intercloud elegantly mee…

Read More >>

Tags: , , , , , ,

Partner Voices: Cloud, Data Security, and Business Continuity with Cisco Cloud-Powered Solutions from TekLinks

Well we’re deep into football season, so I decided what better time to chat with David Powell, TekLinks Vice President of Managed & Cloud Services, than when his beloved Alabama Crimson Tide are fighting for a spot in the College Football Playoffs. (Meanwhile, my Wake Forest Demon Deacons are mired in their sixth straight losing season.) In short, I thought a little distraction for David would be good for him, and he agreed to give me some i…

Read More >>

Tags: , , , , , ,

So you’ve got a cloud strategy? Sorry. What you need is a roadmap.

…elivers what users rightfully expect and need Create a foundation for solving big data challenges Programme 2: Cyber security Why focus here? Make no mistake: hackers are already inside. Your organisation needs a security approach co-ordinated between the CISO (Chief Information Security Officer), the IT department, the business and end users – driven by a pragmatic IT security strategy framework which balances risk with benefits. How Cisco sol…

Read More >>

Tags: , , , ,

IT Value Map: your compass for cloud transformation

…application/service Benchmarking vs. peer organisation in the region. Governance Pillar 4: Risk management and cyber security The fourth pillar looks at how to create secure information flows while empowering civil servants. This involves putting in place processes for confidentiality, authentication, data integrity and availability while delivering state-of-the-art cyber attack protection and remediation. Example Measurement Metrics: Build an…

Read More >>

Tags: , , ,

A Dynamic Integration: FireSIGHT and ISE

With the security landscape constantly evolving and attackers innovating at the rapid pace, it is important that we keep up with attackers.  For this reason we have based our security on imperatives like being visibility-driven and platform-based. Organizations need total visibility of their environments for full contextual awareness, ultimately enabling better network protection, since we can’t protect what we can’t see.  The imperative of bein…

Read More >>

Tags: , , , , , ,