Cisco Blogs


Cisco Blog > The Platform

Cisco Positioned as a Leader in the 2010 Magic Quadrant for SSL VPNs

Mobility is changing the way I work. I work in the office, at home and wherever I am between the two. Not only do I have a smartphone, I also have an iPad and a corporate laptop. I access email and work using all three devices, happy that I can seamlessly connect from anywhere, at anytime, from any device. I am not unlike many workers today where work is becoming an activity and not a place and I need consistent security enforcement and protection, particularly when I am outside of the office.

Three letters enable much of this, V – P – N. VPNs are not new but Cisco continues to innovate with new VPN and secure mobility solutions to secure mobile workers like me. For instance, in October Cisco announced AnyConnect 3.0 that ties the client to web security in the cloud via Cisco ScanSafe in addition to an on-premise Web Security Appliances and the AnyConnect client is now available for both the Apple iPhone and iPad running iOS version 4.2+. Read More »

Tags: , , , , , , ,

Ask The Expert: AnyConnect Configuration – December 14th

Join us on Tuesday, December 14th, for our upcoming live Ask The Expert event, inside Cisco Live and Networkers Virtual.  This event will be coming to you live from India, the first in our international Ask The Expert Series.  Ask the Expert events are part of our content partnership with the Cisco Support Community. Take advantage of these opportunities to get answers to your questions live, in real-time, by a Cisco expert.

Join Cisco expert Vikas Saxena, a customer support engineer (CCIE security number 19971) at the Technical Assistance Center, Security and VPN team in India as he provides information on configuration basics of AnyConnect SSL VPN Client on ASA through ASDM. He will also provide information on concepts of profiles, tunnel groups, group policies, and troubleshooting of common problems associated with AnyConnect SSL VPN client.

Speaker: Vikas Saxena
Date: Tuesday, December 14, 2010
Time: 2:00 a.m. Eastern / 11:00 PT [13th] / 12:30 p.m. JST / 4:00 p.m. JST
Location: www.ciscolivevirtual.com

Tags: , , , , , ,

Don’t be a Victim – Part 2

Yesterday I talked about the vital importance of passwords in the quest to avoid victimization, but today I will take a look at how some recent changes and advances in technology can have an impact as well.

Some of the fundamental tenants of Borderless Networks include the fact that the network is evolving. No longer the classical, hard crunchy shell with the soft chewy middle, the network has become more open, more amorphous and more mobile. Because of these factors, the network is far more available and useful to users wherever they are, at home, on the road or even chilling at *bucks. Indeed, to illustrate the ubiquity of Borderless Networks, I even saw a woman emailing on a smartphone in the middle of a Zumba class (comic aside, my participation in Zumba is a lot like an inebriated bear doing ballet, but that is a different story). The network is no longer confined to the safe castle-keep of the Enterprise, but instead now follows us wherever we go. This creates opportunities, such as receiving email from the boss while you sip a latte at a coffee shop, but it also creates vulnerabilities as well, which we will come back to.

Read More »

Tags: ,

New Borderless Technologies

November 3, 2010 at 7:20 am PST

Hardev Singh and the new Sup6E

Welcome to the technology grab-bag…we have a little somethin’ somethin’ for everyone I think -- bottom line -- the hits keep coming!  Tons of huge stuff from our Borderless Team that we have the privilege of breaking down for you…but you gotta watch the show.  In a nutshell:  Catalyst 4500, New SUPS, Old SUPS with new Skills….plus the 800 series ISRs, Fire and Forget security now available on your iPhone with AnyConnect, AND UCS Express….(Cisco data center mojo now available in snack size…)

So how do we cover so much in a single show?

Read More »

Tags: , , , , , , , , , , ,

Borderless Networks: Meat to Go

Yesterday we took a look at some concrete examples of Borderless Networks in the enterprise and home office.

Today, while we have seen that there is plenty of meat in Borderless Networks in the office, Borderless Networks has plenty of meat on the road as well. Bob, our enterprise worker, travels a lot, doing tradeshows and customer visits and dispensing Kool-Aid of various types. When he knows he is going to have to do some heavy lifting with PowerPoint he is sure to take a laptop running AnyConnect, a secure VPN client that works with the Cisco ASA firewall back at HQ to give secure, encrypted remote access. Even if he is in a coffee shop using public Wi-Fi, he knows that his data is safe because everything is going back through that encrypted tunnel. But it is more than just connectivity that we are talking about here because traffic goes through a Cisco Ironport web security appliance, filtering spyware, trojans and the like. And, just like when he is in the office, TrustSec ensures that he has access to what he needs and can’t touch the things he doesn’t. Security is deeply integrated into the network itself, not just an afterthought or add-on appliance.

Read More »

Tags: , , , , ,