It’s only been a few days since we said goodbye to 2012 and we are already seeing what many predicted for 2013: an increase in the creation, enhancement, and usage of numerous exploit kits by cyber criminals. Cyber criminals don’t take long vacations in December. On the contrary, they “work hard” and make lots of money during the holiday season! These criminals are continuously improving their tools to keep up with us (the good guys) and continue enhancing their “money-making machines.” A real-life example is how cyber criminals were able to quickly incorporate the exploits of the recently found Java vulnerability that I described in a post a few days ago.
Exploit kits make it easy for these criminals because they can easily spread malicious software that exploits well-known and new vulnerabilities. New exploit kits are loaded with some of the most dangerous zero-day exploits and other features that allow criminals to increase their profits.
Previously I talked about the growing demands and how the role of IT has to change from a cost center to a business strategic partner. And we also looked at the journey you need to take to deliver IT as a Service. Cloud computing is part of this journey and it is happening – and I mean all types of Clouds – Private, Public and Hybrid. In other words, we are entering the World of Many Clouds. Forrester Research recently published a report that concluded, “Cloud computing is ready for the enterprise… but many enterprises aren’t ready for the cloud.”1 Yet cloud deployments are happening, driven by workload virtualization and changes in application architecture and usage.
Take a look at this short video with Paul Perez (VP/GM of Unified Computing System and CTO of Data Center Group) and me. Paul shares his insights on the trends of how Cloud is changing the way of the IT and the challenges you will be facing.
Guess what? Once again Cisco is here to help you on your journey to the World of Many Clouds. How you ask?
Previously I talked about the growing demands and how the role of IT has to change from a cost center to a business strategic partner. It’s important to acknowledge that getting an organization to the point where it can implement IT as a Service isn’t easy, nor does it take place all at once. Every customer has their own journey and different customers will take different journeys. For some, it’s all about doing what they do now, only more efficiently or perhaps adding new capabilities. For others, it’s about making that full-blown transformation to service-driven IT.
So how do you get there? Each phase expands into a series of key initiatives…
It all starts with moving into more of a unified architecture of network fabric and corresponding operations.
Is your network ready to help you transform and be the strategic partner that you can be? Let’s face it… Today’s data centers are challenged with siloed resources and facilities… Limited scalability… Poor resource utilization… Growing complexity…Perhaps the biggest challenge is time. When 80% of your resources are dedicated to “keeping the lights on” and managing all what you have, there is very little time left for innovation that benefits the business.
And the reality is that the role of IT has to change – from a cost center to a business strategic partner! Why? Because there are increasing demands on IT to help your business differentiate in order to survive and grow in these rough economic conditions. And let’s not forget that the increasing cost pressures, technology changes, and the advent of game-changers like cloud are forcing IT executives to look at how to deliver IT differently.
These growing demands put even more pressure on the shoulders of IT especially given the current state of your Data Centers. The data center network sits at the core of IT and is key to how IT can deliver services and provide value back to the business.
The Global Certification Team (GCT) is extremely proud to announce the receipt of Common Criteria certification for our ASA 5500 & 5585 Series Security Appliances including: Cisco ASA 5505, 5510, 5520, 5540, 5550, 5580-20, 5580-40, 5585-S10, 5585-S20, 5585-S40, and 5585-S60, running Cisco ASA Release 8.4(4.1). This certification effort was completed at Assurance Level: EAL4+, and evaluated against the US Government Protection Profile for Application-level Firewall in Basis Robustness Environments, Version 1.1, July 2007.
In addition to a robust firewall, businesses of all sizes need a full complement of security services, including intrusion prevention, VPN, content security, unified communications, and remote access. The Cisco ASA Family of security devices was built to meet these needs. More info on the Cisco ASA family can be found on Cisco.com
Get up to the minute updates on Cisco product certifications from the official GCT twitter,@CiscoCertTeam!