Cisco Blogs


Cisco Blog > The Platform

Securing What’s At Stake with the Internet of Things

The Internet of Things (IoT) has made a profound impact on our lives.  However, it also means that more personal information and business data will be passed back and forth in the cloud, and with that comes new security risks, new attack surfaces, and new kinds of attacks. And with an unprecedented number of companies staking the future of their businesses on the pervasive connectedness that the IoT world promises, business leaders need to empower their technical teams to create secure IoT networks.

Most organizations deploy disparate technologies and processes to protect key elements of their businesses, including the information technology (IT) that is typically focused on information protection and operational technology (OT) charged with managing control networks that support critical infrastructure, as well as physical spaces.  I recently encountered a company that implements more than 80 security products for different tasks.  Many of these systems don’t work together, which in turn limits the level of security this company can achieve.

In an IoT environment, we need to accommodate the priorities of both IT and OT networks, balance physical safety and security requirements, and also begin to implement cybersecurity solutions to equally protect all networks from attack.  Solutions must be put into place to protect the device, control levels of the network, and the data contained and shared. We need to shift our mindset from considering each object in isolation, to looking at the whole. Attackers are taking a holistic view of the IoT and defenders must do the same.

Read More »

Tags: , , ,

#CiscoChampion Radio S1|Ep10 Cyber Security

#CiscoChampion Radio is a podcast series by Cisco Champions as technologists, hosted by Cisco’s Amy Lewis (@CommsNinja). This week Chris Young, SVP Security Business Group Cisco, and Bill Carter, Senior Network Engineer and Cisco Champion, talk about Intelligent Cyber Security for the real world.

Listen to the Podcastcisco_champions BADGE_200x200

Cisco Subject Matter Expert: Chris Young, SVP Security Business Group Cisco (@YoungDChris)
Cisco Champion: Bill Carter, Senior Network Engineer (@billyc5022)

Highlights:
How Cisco deals with fragmentation in Security market
Attack-driven model for Security, before, during and after
How Sourcefire acquisition fits in with Cisco Security
Open Source Security around Snort Community Read More »

Tags: , , , ,

Cisco Partner Summit Day 2: The Pace of Change

March 26, 2014 at 8:15 pm PST

With day one of Cisco Partner Summit covering the Cisco Partner Ecosystem, day two opened with the Magnetic Poets and a performance that included the entire audience. Partners were able to open day two of the event by performing with the band, via their own mobile devices.

Bruce Klein, Cisco SVP of Worldwide Partner Organization, then took the stage and talked about the continuing level of excitement this week. He kept things brief, since he wanted partners prepared for a different format for the General Session on day two this year. This morning’s session featured five Cisco executives speaking for 15 minutes each, focusing on the subject to be covered in an afternoon business transformation sessions.

We were able to catch up with partners to hear their perspectives on the 15 minute talks from today’s General Session. Here’s what they had to say:

Read on for a full recap of day two of Cisco Partner Summit. Read More »

Tags: , , , , , , , , ,

Summary : Sourcefire in our Data Center by Cisco Chief Security Officer

December 6, 2013 at 7:00 am PST

 

Sourcefire

 

 

 

 

 

Last October , Cisco confirmed that Sourcefire was now part of our family of security products and solutions .

“With this acquisition, we take a significant and exciting step in our journey to define the future of security. As one company, we offer an unbeatable combination that will greatly accelerate our mission of delivering a new, threat-centric security model. Through the addition of Sourcefire’s competitive talent and technologies, I see vast opportunities to expand Cisco’s global security footprint in both new and emerging markets, broaden our solution sets and deepen our customer relationships “

Chris Young, Cisco Senior Vice President Security Group
in his blog “Delivers Threat-Centric Security Model “

“Beyond the technology, one of the things that is important to me is that Cisco and Sourcefire both share key values that transcend our company names, HQ locations and number of employees. Much like Sourcefire’s Firemen Principles, you can be confident that these values will continue as one team at Cisco.”

Martin Roesch, Sourcefire founder and CTO and now VP and Chief Architect of Cisco Security Group
in his blog ONE Team 

These days , John Stewart , Senior Vice President, Cisco Chief Security Officer , announced that we completed the  deployment of Sourcefire at Cisco . John Stewart oversees at Cisco the Threat Response, Intelligence and Development ( TRIAD ) organization .

The implementation is already giving us insights into our data center that we never had before

To know  more about this deployment and John’s first impressions check his blog
 The First Inline Production Deployment at Cisco 

 

The Cisco security architecture helps data center networking teams take advantage of security capabilities built into the underlying data center fabric, to accelerate safe data center innovation. There are three important security measures that every IT organization should follow to securely support data center innovation. 
To learn more, download the Cisco white paper “Three Must-Have Security Measures that Accelerate Data Center Innovation.”

Tell us what do you think of the acquisition of Sourcefire by Cisco .

 

Tags: , , , , , , , ,

Security Drives Major Transition in the Network and Data Center

Today, rapid changes in the world we live in, driven by technology trends, business model changes and market transitions, like the Internet of Everything, profoundly impact our networks and our data centers. With the advent of all of these new capabilities, we have created a new paradigm for security—it is what I refer to as the “Any to Any” Problem. That is, any user on any device increasingly going over any type of connection, to any application, that could be running in any data center and on any cloud. Regardless of how or where our users are connecting, we have to provide the right levels of inspection and protection against malicious actors.

Today, Cisco is announcing the new Application Centric Infrastructure (ACI) designed to seamlessly integrate layer 4 through layer 7—and security, in particular—into next generation Data Center environments. As part of this framework, we are announcing ACI Security Solutions, which support next generation Cisco ASA physical and virtual firewall technologies by stitching them directly into the ACI network fabric, and can be managed using the ACI Policy Infrastructure Controller management tool.

The Cisco ASA 5585-X Series Next-Generation Security Appliance has been updated and certified to interoperate with the new Nexus 9000 switches—whether they are deployed in traditional or ACI modes. The new Cisco ASA Virtual Firewall (ASAv) performs the same functions as any ASA appliance. However, unlike an ASA 1000v Cloud Firewall, the ASAv maintains its own data path. This allows it to work with any virtual switch and it will be available on multiple hypervisors.  Read More »

Tags: , , , , ,