Cisco Blogs


Cisco Blog > Enterprise Networks

Prepare for Data Breaches! They Will Happen … to Anyone

September 15, 2014 at 5:05 am PST

Do you feel that you’ve been hearing a lot about data breaches lately? You are right! Take a look at the chart below. There is plenty of time left in September, but the data breach calendar is already filled with victim names. And August? I don’t even have enough space to put down all the victim names.

If anyone believes that if we do a great job, we can fully guard our data and valuable information assets against attacks and breaches, now it’s time to think again. The reality is, data breaches can happen to anyone. They are happening everywhere from household names, to lesser-known businesses or organizations, and  to the mighty government of the United States. The question is no longer “if”, it is “when”.

However, this does not mean that we will just give up. On the contrary, we need new thinking. And get prepared. We need to be prepared before breaches take place to minimize their chances to succeed. We need to be prepared during breaches to detect and stop them. And we need to be prepared to rapidly apply mitigations after breaches. We cannot totally eliminate these risks, but we can control and minimize them. Read More »

Tags: , , ,

Back By Popular Demand – Learning Opportunity on Catalyst 3650

AN94721_240x200A few months ago we had a webcast on the Catalyst 3650 and it was so popular, there were so many questions, we thought we’d host another one! This webcast is being held on August 19th at 10am PT and you can register here!  

Topics to be discussed include:

  • Top of mind IT issues
  • The Catalyst 3650 Series Switch features & innovations
  • Model selection recommendations
  • Campus and branch office deployment considerations
  • Live Q&A

Why should you attend?

Managing your network today has become more complicated than ever. In addition to the challenges of supporting an increasingly mobile workforce and a plethora of BYOD users, you are being asked to reduce IT complexity and cost and strengthen security.

Read More »

Tags: , , , , , , , ,

Securing Your Network Before BYOD or IoT

If you’re a network engineer or have been following some of the recent trends in network security space, you may have come across terms such as “erosion of trust”, “zero trust ecosystem”, “the increased attack surface” and “new attack vectors”. What this means for a network engineer is that as application migrate from on-prem to cloud, and trends like mobility and IoT vastly expand the scale of assets and forms of access to be secured, traditional network security, which historically was centered around securing the perimeter of your network, is no longer sufficient.

Anatomy of Data Breach

I was recently reading the Symantec Internet Security Report. This report has been quite appropriately themed as “2013: Year of the Mega-Breach”. In particular, the Point-of-Sale type of attack, mostly prevalent in the retail segment of the market, is a great indicator of the anatomy of a typical breach. So I’ll use that as an illustrative example for the purposes of this post.

Read More »

Tags: , , , , ,

The Network After 25 Years of Cisco Live!

#clus1A lot can change in 25 years. At the first Cisco Live (then known as Networkers conferences) in 1989, 200 geeks gathered for the inaugural event. Fast forward to three weeks ago, when we welcomed a whopping 25,000 attendees into the arms of our namesake, beautiful San Francisco.

We heard there was some interest in how the network performed at the show, so I wanted to share some of the interesting statistics about the network at Cisco Live! I shudder at the thought of the ancient network from 25 years ago. So here we go:

Wi-Fi Client Devices

This year we saw 30,705 unique devices, with 7000 in the theater for John Chambers’ keynote.

# of Unique Clients

# of Sessions

# of Unique Users

# of Unique APs

Avg Users per AP

30705

1396239

30705

859

33.64

Max. Concurrent Connected Wi-Fi Devices

There was a peak of 14216 concurrently connected device at SF this year.

clients2 Read More »

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

How A School District Prepares for PARCC and More

CreepyKidIndian Prairie School district, the third largest school district in Illinois, conducted an in-depth investigation to develop an execution plan to adopt Partnership for Assessment and Readiness for College and Careers (PARCC) consortium guidelines and meet the Common Core State Standards head-on. Their execution plan took them beyond the basic requirements of online testing to providing a secure, borderless learning environment for a variety of devices, over wired and wireless.

Not only was this a great opportunity for them to upgrade their network to meet the state and national testing standards, but also to lay the foundation for any future requirements as technological advances are rapidly changing the education landscape.

Requirements: 

  1. Meet the computer-based testing requirements under PARCC
  2. Provide a borderless learning environment through mobile and online learning
  3. A stable infrastructure that can meet the dynamic network demand
  4. Prepare for the growing importance of technology in classrooms, wired and wireless, with trends such as BYOT (Bring Your Own Technology) as well as an increased use of district-owned devices.

 

Read More »

Tags: , , , , , , , , , , ,