Cisco Blogs


Cisco Blog > Open at Cisco

Announcing OpenSOC .1

OpenSOC, an open source security analytics framework, helps organizations make big data part of their technical security strategy by providing a platform for the application of anomaly detection and incident forensics to the data loss problem. By integrating numerous elements of the Hadoop ecosystem such as Storm, Kafka, and Elasticsearch, OpenSOC provides a scalable platform incorporating capabilities such as full-packet capture indexing, storage, data enrichment, stream processing, batch processing, real-time search, and telemetry aggregation. It also provides a centralized platform to effectively enable security analysts to rapidly detect and respond to advanced security threats.

A few months ago we were really excited to bring OpenSOC to the open source community.  Developing OpenSOC has been a challenging, yet rewarding experience.  Our small team pushed the limits of what is possible to do with big data technologies and put a strong foundational framework together that the community can add to and enhance.  With OpenSOC we strive to provide an open alternative to proprietary and often expensive analytics tools and do so at the scale of big data. Read More »

Tags: , , , , , ,

On February 12 Partners Learn How Cisco Big Data Analytics Transforms Business

In an Internet of Everything era, enterprises and public sector organizations have developed an insatiable appetite for data. Data is being gathered from an increasing number of sources, and—from an analytics perspective—the more data your customers have, the better the insights they can gain.

We recognize that analytics represent a truly transformational business opportunity for our partners. It enables enterprises to make dramatic changes in their business processes that will significantly strengthen the competitive edge.  Many strategic analytics deployments will be driven by line of business (LoB) managers representing key roles within enterprise organizations. These are things like manufacturing, product development, sales, operations, marketing, and HR—where an increasing percentage of IT spending is being initiated.

The great news is that Cisco has the ideal, end-to-end infrastructure for big data and analytics deployments, featuring Cisco Unified Computing System (UCS), Application Centric Infrastructure (ACI), and our robust suite of management automation and data virtualization software.

But infrastructure is only part of the equation! Engaging a range of analytics ecosystem partners to help manage data, integrate data, and finally, analyze data will be critical in delivering successful big data and analytics solutions to your customers. Read More »

Tags: , , , ,

Using a Robot to Get Marketing Insights for Your Venue?

NRF 2015 is a wrap. The annual show where anyone who’s anyone in retail goes to learn about the latest ways to grow revenues and improve store operations. Here’s something you may have missed:

Collecto

Meet Collecto. Your one stop shop for all marketing Read More »

Tags: , , , ,

Reducing the Attack Surface: Takeaways from the 2015 Annual Security Report

As the Cisco 2015 Annual Security Report shows, current security approaches aren’t sufficient. Attackers are shifting methods and becoming more sophisticated in their approaches, users are unwittingly complicit enablers, and defenders struggle to keep up with all of these things. It is time for defenders to take a different approach to security that not only outwits attackers but also makes security a competitive advantage that enables business growth.

By taking a threat-centric and operational approach to security, organizations can reduce complexity and fragmentation, while providing superior visibility, continuous control, and advanced threat protection across the extended network and the entire attack continuum.

Using Cisco technology, this approach is enabled by broad visibility for superior intelligence across the extended network, where all the solutions a customer deploys communicate with each other. Organizations using siloed solutions will have holes in their security. Siloed solutions do not provide full protection since they do not communicate with one another, thus leaving security gaps and the inability to create actionable intelligence.

Cisco can provide a holistic solution to this problem by reducing the attack surface and extending protection across the network – before, during and after attacks.

Read More »

Tags: , , , , , ,

Exploring Global Digital Transformations for 2015

2014 ended with a flurry of technology conferences in Europe and the Middle East.  In November, the European Commission’s (EC) annual Information and Communications Technology (ICT) Conference addressed how to make the EC a 21 Century organization.  In December, the International Telecommunications Union Telecommunications Standardization Sector ( ITU-T) hosted a meeting in Doha, Qatar for CTOs.  Among the issues discussed were updates on the Global Standardization Landscape, status of Internet of Things Standardization and next generation video technologies and standards.   Also in Doha, at the same time The ITU hosted World Telecom whose theme was “Future in Focus: how disruptive developments in technology, business and society are transforming the ICT industry.” All the meetings gave us much to think about for 2015. Günther Oettinger , European Union  Commissioner for Digital Economy and Society kicked-off the ICT DIGIT-IT conference by outlining his strategy for achieving a digital transformation within the European Union.  He went on to detail specific areas he thought needed the most attention including:

  • Effective Workplace
  • Real time administration
  • Open Data
  • Collaborative working tools
  • Security and cyber-security (mentioned as number 1 priority)
  • Growing usage of Cloud for non-strategic data
  • Importance of Big Data and Internet of Everything
  • Openness and Collaboration between the different EU organizations
  • Attracting young generation within EU, build and retain talent

Effective workplace

As Commissioner Oettinger concluded his presentation, I was struck by how similar Read More »

Tags: , , , , , ,