Cisco Blogs

Search Results

329 posts found

A New Model to Protect the Endpoint, Part 2: Attack Chain Weaving

…penetrate endpoints and networks. However, as these attacks unfold, they leave in their wake massive volumes of data. Attack Chain Weaving allows defenders to use this data to their advantage. A big data architecture handles the ever-expanding volume of data that is essential to effective malware detection and analytics, and a continuous approach uses that data to provide context and, most importantly, prioritization of events when and where you…

Read More >>

Tags: , , ,

The Napkin Dialogues: Nexus Programmability, Part I

I know that I take a different approach to learning new things than most people. At least, I know my approach is different than the way people present them. The good news is that when I get something, I really get it. However, when looking at the juggernaut that is “Software-Defined X,” or even “programmability,” I know that I’m still a long, long way away from feeling like I have a handle on it. When I wrote the previous blog post on some of th…

Read More >>

Tags: , , , , ,

#SmartConnectedCity Series: Dallas, Big Smart Things Happen Here

…em solving for city officials. Bringing government transparency into the digital age. In 2013, Dallas launched a data sharing initiative that contributes to effective governance and demonstrates the city’s commitment to transparent government. The Open Data Portal allows quick, free, and unrestricted access to public records online. This database is designed for regular updates and meets a connected cities’ evolving needs. Prioritizing smarter se…

Read More >>

Tags: , , , , ,

How Cisco Helped Solutionary Boost Security and Improve their Hadoop Performance

…sily scale and support in-depth analysis. Their challenge was to figure out how to:   1)     Increase their data analytics capabilities and improve their clients’ security   2)   Cost-effectively scale as their clients/data volume grows   When a security threat occurred in the past, the legacy systems could only be used to analyze log data; they couldn’t see the big picture. Thus, when an event happened, it would sometimes take wee…

Read More >>

Tags: , , , , , , , , , , , , ,

Join Cisco at the Light Reading Big Telecom Event in Chicago

…tions of networking technologies and applications that deliver real insight and tangible value to attendees. The BIG Telecom Event (BTE) will be a single big-tent event that aggregates all the hottest areas across our industry – including SDN/NFV and the carrier cloud, Ethernet, telco data centers, service orchestration, packet-optical transport, mobile backhaul, mobile network security, 4G/small cells, service provider IT, content management, an…

Read More >>

Tags: , , , , , , , , , , , ,