Cisco Blogs


Cisco Blog > Security

Securing Any Device—For the Exceptional Connected Experience

February 11, 2013 at 4:23 pm PST

Secure access continues to be paramount for a connected world. People connect to the Internet for business and for personal use, from wired, wireless or mobile devices—locally and remotely. The Internet is a global system of interconnected networks. User devices, the Internet, and all computer networks are the target of a growing number of increasingly complex security threats. Let’s take a look at some recent trends from the Cisco Connected World Technology Report that speaks to the need for secure access:

  • Three devices is the average per end user with the desire or mandate to work anywhere and anytime—how do we ensure control of all these devices?
  • 71 percent of the next generation workforce will not obey the policies—how do we enforce policy?
  • 60 percent will not be responsible for protecting corporate information and devices—how do we protect sensitive data?
  • Mobile malware is growing; Android malware grew over 2000% from 2012 but is only 1% of the web malware encounter—how do we ensure secure connection from your mobile device and with web intensive users   Read More »

Tags: , , , , , , , ,

From Cisco Live London: Architecture updates posted here all week…

January 28, 2013 at 8:28 am PST

I am sitting and reflecting here at the start of Cisco Live London. As I walk the halls, I continue to be amazed by the size, depth, and breadth of this event. Networking continues to grow, and thousands of people are eager to come together to see the latest. Read More »

Tags: , , , , , , , , , , , ,

Ask the Data Center Security Expert: Context-Aware and Adaptive Strategies for an Agile Data Center

At Cisco Live London, one of my data center theater presentations will focus on the benefits of a context-aware and adaptive security strategy. This approach helps accelerate the adoption of virtualization and cloud, which traditional static security models often inhibit. Context-based approaches factor in identity, application, location, device, and time along additional security intelligence such as real-time global threat feeds for more accurate security access decisions.

Neil MacDonald, vice president, distinguished analyst, and Gartner Fellow in Gartner Research has been advocating the benefits of a context-based approach now for some years as outlined in his Gartner blog. Not only does he say that by 2015, 90 percent of enterprise security solutions will be context-aware but in cloud computing environments where IT increasingly doesn’t own key IT stack elements, having additional context at the point of security decision leads to better decisions with risk prioritization and business factors accounted for. Neil MacDonald also co-authored a report, “Emerging Technology Analysis: Cloud-based Reputation Services,” which highlights the value of cloud-based threat intelligence in enabling secure cloud adoption.

Read More »

Tags: , , , , , , , ,