Cisco Blogs


Cisco Blog > Partner

How Businesses Can Meet Next Generation Workforce Demands

Over the past 10 years, the consumption of technology has become more accessible than ever. The workspace has shifted from being heavily reliant on the fax machine to now allowing people to be in different parts of the world, yet flawlessly connected to their company’s network.

The result of these technological advancements – such as the growth of mobility, cloud and big data – is the evolution of the Next Generation Workforce, which has immense opportunities for businesses and interested candidates.

For example, considering that 74% of millennials want flexible work schedules, the Next Generation Workforce will seek remote collaboration more than ever before. Companies that will succeed at recruiting and retaining these candidates will be those that practice flexibility through the use of technology, while simultaneously showing employees that the work they are doing is both impactful and valuable.

Tailoring to the interests of these future candidates is an investment that companies must think about now – especially because by 2025, millennials will account for 75% of the global workforce. Employers who take new approaches to management, offering flexible benefits and providing effective employee retirement planning strategies will benefit from a three-generation workforce that is engaged, energized and experienced.

Midmarket Next Generation Workforce Blog Image

However, as the Next Generation Workforce evolves, there are certain challenges businesses must overcome to successfully excite and attract top talent. Here’s a closer look at those challenges – especially for those in the midmarket industries – and what they can do today to remain competitive and innovative in a rapidly changing landscape. Read More »

Tags: , , , , , , , , ,

A New Model to Protect the Endpoint, Part 2: Attack Chain Weaving

In my last post, I talked about the need for a paradigm shift from point-in-time detection technologies to a new model that combines a continuous approach with a big data architecture. This new model lets Cisco deliver a range of other innovations that enhance the entire advanced malware protection process across the full attack continuum—before, during, and after an attack.

One of these innovations, unique to Cisco AMP for Endpoints, is Attack Chain Weaving which introduces a new level of intelligence not possible with point-in-time detection technologies.

We all know that attackers are making it their job to understand traditional point-in-time detection technologies and innovate around their limitations to penetrate endpoints and networks. However, as these attacks unfold, they leave in their wake massive volumes of data. Attack Chain Weaving allows defenders to use this data to their advantage. A big data architecture handles the ever-expanding volume of data that is essential to effective malware detection and analytics, and a continuous approach uses that data to provide context and, most importantly, prioritization of events when and where you need it.

Read More »

Tags: , , ,

The Nexus of the Internet of Everything? It’s in the Palm of Your Hand.

On a typical day, we hold in our hands a portal to our civilization’s entire trove of information and entertainment — and a window into our finances, our health, and the lives of our friends. Not to mention, the ability to make a purchase anywhere and anytime the whim strikes us.

To say that our personal devices have become an integral part of our lives is a vast understatement. But get ready for an even bigger wave of change. Mobile is poised to become ever more ubiquitous. But the focus will be less on the device itself, and more on its role as a critical enabler in the connected world of the Internet of Everything (IoE).

Read More »

Tags: , , , , , , , , , , ,

Forget Looking in the Mirror, It’s Your Digital Image That Truly Matters

It’s great to stay in shape at the gym and pick out stylish clothes. But more and more, the personal image that really counts is digital.

That’s because the Internet of Everything (IoE) era demands new ways of looking at, well, just about everything. And everything includes you. In an expanding universe of new connections, each of us needs to ask, just where do I fit? And how am I being viewed?

In short, what is my digital persona?

The ways in which we are seen online have assumed acute importance in recent years, and that only stands to increase. Therefore, our digital personas have to be cultivated and maintained, just as we care for our images in the physical world.

In career terms, for example, you may be known in your daily work life as a good leader. But the physical world has limited reach.  If there is no evidence of that in the digital world, you will be in trouble, especially if you happen to be looking for a new job. Recruiters, of course, know that they can do an instant search and start compiling your digital profile within seconds. If you say you’re an expert or a good manager, your digital persona had better back it.

According to some recent research, job recruiters are turning more and more to Facebook, which by some measures is becoming even more impactful for employment purposes than LinkedIn. So, if the personal social media site can actually trump the professional social media site, think twice before you post those Spring Break photos.

As the consumerization of IT extends ever further into the workplace — via personal devices, social media, and so forth — the blurring of the personal and the professional will only continue.  As a result, everyone must be aware that personal actions have an impact comparable to professional achievements. And the digital trail that you leave behind every day influences how you are perceived in the marketplace.

Read More »

Tags: , , , , , , , , , ,

How Cisco Helped Solutionary Boost Security and Improve their Hadoop Performance

Every day, security threats continue to evolve, as cyber attackers continue to exploit gaps in basic security controls. In fact, the federal government alone has experienced a 680% increase in cyber security breaches in the past six years, and cybersecurity attacks against the US average 117 per day. Globally, the estimated annual cost of cybercrime is over $100 billion. Often, even when security breaches are identified, it can be extremely difficult to figure how they happened or who is responsible.

One company working hard to prevent these threats is Solutionary, a managed security services provider (MSSP) that actively monitors their customers’ technology systems in order to identify and thwart security events before any negative impacts occur.

In order to provide real-time analytics of client traffic and user activity, Solutionary, a wholly owned subsidiary of NTT Group, developed a patented Solutionary ActiveGuard® Security and Compliance Platform which correlates data across global threats and trends in order to quickly identify security alerts and provide clients with actionable alerts.

The patented, cloud-based ActiveGuard® Security and Compliance Platform is the technology behind Solutionary Managed Security Services

The patented, cloud-based ActiveGuard® Security and Compliance Platform is the technology behind Solutionary Managed Security Services

 

 

 

 

 

 

 

In order to keep up with growing data volumes, the need for fast security analytics, and their expanding client base, Solutionary needed to find a way to quickly scale their infrastructure, as their traditional server infrastructure was not able to easily scale and support in-depth analysis. Their challenge was to figure out how to:

 

1)     Increase their data analytics capabilities and improve their clients’ security

 

2)   Cost-effectively scale as their clients/data volume grows

 

When a security threat occurred in the past, the legacy systems could only be used to analyze log data; they couldn’t see the big picture. Thus, when an event happened, it would sometimes take weeks of forensics work to figure out what had occurred. In order to meet these challenges, Solutionary turned to the MapR Distribution for Hadoop running on the Cisco Unified Computing System™.  By using Hadoop, Solutionary was able to smoothly analyze both structured and unstructured data on a single data infrastructure, instead of relying on a costly traditional database solution that couldn’t pull in both structured and unstructured data into a single platform for analysis.

Cisco UCS Common Platform Architecture for Big Data

Cisco UCS Common Platform Architecture for Big Data

 

 

 

 

 

 

 

 

 

Specifically, the Cisco/MapR environment consists of two MapR clusters of 16 Cisco UCS C240 M3 Rack Servers. Solutionary uses the Cisco UCS Manager to provision and control their servers and network resources, while the Cisco UCS 6200 Series Fabric Interconnects provide high-bandwidth connections to servers, and act as centralized management points for the Cisco infrastructure, eliminating the need to manage each element in the environment separately. Because of the environment’s high scalability, it’s easy for the fabric interconnects to support the large number of nodes needed for MapR clusters. Scalability is improved even further by using the Cisco UCS 2200 Series Fabric Extenders to extend the network into each rack.

Cisco UCS Components

Cisco UCS Components

 

 

 

 

 

 

 

 

 

 

 

 

 

With MapR and the Cisco UCS CPA for Big Data environment, Solutionary can now access a much greater amount of data analysis and contextual data, giving them a more informed picture of behavior patterns, anomalous activities, and attack indicators. By quickly identifying global patterns, Solutionary can identify new security threats and put them into context for their clients.

Let me know if you have any comments or questions, or via twitter at @CicconeScott.

 

 

Tags: , , , , , , , , , , , , ,