Do you feel that you’ve been hearing a lot about data breaches lately? You are right! Take a look at the chart below. There is plenty of time left in September, but the data breach calendar is already filled with victim names. And August? I don’t even have enough space to put down all the victim names.
If anyone believes that if we do a great job, we can fully guard our data and valuable information assets against attacks and breaches, now it’s time to think again. The reality is, data breaches can happen to anyone. They are happening everywhere from household names, to lesser-known businesses or organizations, and to the mighty government of the United States. The question is no longer “if”, it is “when”.
However, this does not mean that we will just give up. On the contrary, we need new thinking. And get prepared. We need to be prepared before breaches take place to minimize their chances to succeed. We need to be prepared during breaches to detect and stop them. And we need to be prepared to rapidly apply mitigations after breaches. We cannot totally eliminate these risks, but we can control and minimize them. Read More »
A few months ago we had a webcast on the Catalyst 3650 and it was so popular, there were so many questions, we thought we’d host another one! This webcast is being held on August 19th at 10am PT and you can register here! Tweet
Topics to be discussed include:
Top of mind IT issues
The Catalyst 3650 Series Switch features & innovations
Model selection recommendations
Campus and branch office deployment considerations
Why should you attend?
Managing your network today has become more complicated than ever. In addition to the challenges of supporting an increasingly mobile workforce and a plethora of BYOD users, you are being asked to reduce IT complexity and cost and strengthen security.
If you’re a network engineer or have been following some of the recent trends in network security space, you may have come across terms such as “erosion of trust”, “zero trust ecosystem”, “the increased attack surface” and “new attack vectors”. What this means for a network engineer is that as application migrate from on-prem to cloud, and trends like mobility and IoT vastly expand the scale of assets and forms of access to be secured, traditional network security, which historically was centered around securing the perimeter of your network, is no longer sufficient.
I was recently reading the Symantec Internet Security Report. This report has been quite appropriately themed as “2013: Year of the Mega-Breach”. In particular, the Point-of-Sale type of attack, mostly prevalent in the retail segment of the market, is a great indicator of the anatomy of a typical breach. So I’ll use that as an illustrative example for the purposes of this post.
A lot can change in 25 years. At the first Cisco Live (then known as Networkers conferences) in 1989, 200 geeks gathered for the inaugural event. Fast forward to three weeks ago, when we welcomed a whopping 25,000 attendees into the arms of our namesake, beautiful San Francisco.
We heard there was some interest in how the network performed at the show, so I wanted to share some of the interesting statistics about the network at Cisco Live! I shudder at the thought of the ancient network from 25 years ago. So here we go:
Wi-Fi Client Devices
This year we saw 30,705 unique devices, with 7000 in the theater for John Chambers’ keynote.
# of Unique Clients
# of Sessions
# of Unique Users
# of Unique APs
Avg Users per AP
Max. Concurrent Connected Wi-Fi Devices
There was a peak of 14216 concurrently connected device at SF this year.
Not only was this a great opportunity for them to upgrade their network to meet the state and national testing standards, but also to lay the foundation for any future requirements as technological advances are rapidly changing the education landscape.
Meet the computer-based testing requirements under PARCC
Provide a borderless learning environment through mobile and online learning
A stable infrastructure that can meet the dynamic network demand
Prepare for the growing importance of technology in classrooms, wired and wireless, with trends such as BYOT (Bring Your Own Technology) as well as an increased use of district-owned devices.