Cisco Logo


In case you missed it, Network World’s Ellen Messmer published a rather surprising article on how Dell was going to “trump” Cisco in the information security market as a result of some recent acquisitions. Now certainly Dell is entitled to their beliefs. They’re in a difficult position right now, as Michael Dell and Silver Lake maneuver the company through a very complex set of buy-out related transactions. They need to give their customers assurance that they won’t be distracted through this process. And if you want to set a big impression with your customers, you might as well go after the market leader in security.  Be it as it may, we can’t just sit back and let these blatant statements go unchecked. So, in the spirit of “fair and balanced” reporting, we thought we’d issue our own little fact check and let you conclude for yourself.

But technology alone is not enough.  Dell has every right to tout its credentials in the server market.  They have a very long and rich history in this space that should be honored. But, that alone doesn’t make you credible in the eyes of the most hardened enterprise whose livelihood depends on protecting their most crucial customer data or hard earned intellectual property. This is an area that Cisco takes very seriously. We too have a very long and rich history. The world has relied on our network for decades – for connecting people, information, and places.  Over 70% of the world’s traffic flows through our networks each day. They not only rely on our technology and architecture for their business, they rely on our world-class global threat intelligence and rapid emergency response to keep them safe.

We analyze over 100 terabytes of threat data every day in Cisco’s Security Intelligence Operations’ (SIO) cloud, and make that information actionable to help protect against the most advanced cyber threats. And with the recent acquisition of Cognitive Security, Cisco has become the only vendor with the tools and capabilities to correlate vast amounts of data from network infrastructure, network security and content security, transforming the network into the platform for remediation.  So it’s time for you to judge, who’s in the best position to deliver on a holistic, architectural strategy?

In an effort to keep conversations fresh, Cisco Blogs closes comments after 90 days. Please visit the Cisco Blogs hub page for the latest content.


  1. Lancope rounds out Cisco’s holistic security approach by integrating real-time host level visibility/analysis with the user and device context that ISE provides.

    In addition to Lancopes unique intergration with ISE, we also do something special with the ASA platform. Correlating flow data from the internal network with intelligence from the ASA provides an additional layer of visibility and security context for detecting advanced threats. While firewalls traditionally export data via Syslog, the ASA provides much richer information and unique data points via the NSEL protocol.

    Lancope and Cisco are delivering advanced, proactive security solutions that offer better, more cost-effective protection both now and for the future. Security analysts gain visibility into advanced cyber threats such as:

    Discover Internally Spreading Malware
    Detect Reconnaissance Activity
    Find Data Loss / Exfiltration
    Identify Botnet & Command / Control Activity

  1. Return to Countries/Regions
  2. Return to Home
  1. All Security
  2. All Security
  3. Return to Home