Cisco Logo


The Platform

We don’t just use information technology, we rely on it to live, work, learn, and play. Our lives are about being connected, and today we use myriad devices to access networks to generate and exchange a staggering amount of data. Now, more than ever, security professionals must protect that information and help drive higher levels of trust and confidence in our networks, systems, and online services.

Security professionals must adapt to threats that continually change. Today’s networks are quite complex, presenting security risks and challenges that are increasingly difficult to detect and mitigate. An enterprise faces any number of possibilities – from online sabotage and theft, to espionage and terrorism. Our adversaries are creative, well-resourced, and relentlessly looking for new ways to exploit our vulnerabilities. While they may not always succeed, any success is too much. That means we, as protectors of our networks, have to always be on top of our game, and one step ahead.

The burning question is: How can we stack the odds in our favor? The most advantageous security posture uses an architecture-based approach with in-depth security that is woven throughout the network fabric. This posture embraces context awareness, to help keep the bad stuff out and protect the good stuff, no matter where it resides. Network functionality stays inbounds and compliant, with consistent policies and controls, risk mitigation, auditing, and reporting. And critical online services maintain required uptime, so we can enhance productivity and increase innovation.

While complexity remains one of the greatest network security challenges, one thing is certain – when it comes to outsmarting our adversaries, constant vigilance and preparedness are two weapons that every organization needs in its arsenal. We must also be confident that the data, systems, network, and online services we use are as safe and secure as possible, so we can continue to communicate, interact, work, learn, and play – in business and in life.

In an effort to keep conversations fresh, Cisco Blogs closes comments after 90 days. Please visit the Cisco Blogs hub page for the latest content.

7 Comments.


  1. as we know that the data is very important in our daily work, I totally agree if the security system as you have described above will be very helpful. Can we imagine what if the data that we consider important is lost due to absence of security systems that ensure the security of our data.

       0 likes

  2. yea. security is so important. nowadays we spend more time on social networking sites. Malaysia is one of the country with the most social networking users. Imagine if date is not safe?

       0 likes

  3. As long as the existence of internet and computer, network connections, the problems will continue to exist. Both are linked to each other, I think. The degree of the internet grows network connections that are growing problems. best regards

       0 likes

  4. Hi john
    Thank for share

       0 likes

  5. I have reviewed your blog carefully so beautiful. Thanks for creating a sweet able & popular blog.

       0 likes

  6. Incredibly revealing thanks, I do think your current followers will likely want considerably more writing like that maintain the excellent effort.

       0 likes

  7. Incredibly useful thanks, I do think your readers might possibly want a whole lot more blog posts like that keep up the good hard work.

       0 likes

  1. Return to Countries/Regions
  2. Return to Home
  1. All The Platform
  2. All Security
  3. Return to Home