Anyone who has been involved with compliance knows that simplifying complexity is the key to maintaining a secure and compliant organization. It’s become quite apparent that sustaining compliance is a marathon, and the journey must be travelled with vigilance. This is not something that is an endpoint or a task, that once accomplished, can be shelved and forgotten; therefore, it is very helpful for merchants, who wish to become compliant or maintain compliance, to purchase solutions that are “certified.”
The fact that you are purchasing a product that’s already been validated as secure and “capable” of being compliant reduces the complexity and uncertainty associated with big-ticket items. Adding new credit card readers or a payment application in your stores is expensive, and knowing that these products are validated by the Payment Card Industry (PCI) Council gives merchants confidence that they’re making a wise and secure decision. Read More »
Tags: Cisco Security, cybertrust, pa-dss, PCI Compliance, pci-dss, qsa, qualified security assessor, security
Mobile workers accessing corporate applications and data from a range of personal and corporate devices is fast becoming the new normal. Month by month every survey confirms the inevitable—mixing personal and business data, devices, and apps. Companies are scrambling amidst a sea of new technologies to regain control of their IT infrastructure, and those thinking ahead are planning for more than just tolerance of personal data and scaling mobile access; they’re building the next evolution of application access, which is based on consistent policies for application and data across any access method or device. These architectures demand an integrated system that spans device, network, and application layers, and they demand policies for employee access based on much more than user name and password. Read More »
Tags: byod, Cisco Security, mobility, mobility security, mobility solutions, secure access, security
The RSA Conference is expected to be bigger and better than ever this year—more booths, more vendors, more technical sessions and keynotes.
But I have to ask the question: “Are we as IT practitioners better off now than we were 4 or 5 years ago?” There are a lot of people at the show who worry that the old approaches aren’t working and next generation solutions have not clearly come into focus. I do think, however, there are reasons to be cautiously optimistic.
Join me for a live broadcast from the RSA show floor on Wednesday, February 27 at 10:30 AM PT as I discuss what I’m seeing at the RSA conference and what it means for the IT Security industry. We’ll be taking your questions live via Twitter and Google Hangouts. Read More »
Tags: Cisco Security, CSO, cyber security, John N. Stewart, RSA 2013
As the demand for next-generation data center services increases, organizations have embraced virtualization and cloud-computing technologies that require security architectures to be more dynamic, automated, and services-oriented. Most network security technologies have not kept pace, they are static and fail to protect against modern threats. Additionally, siloed security technologies are a networking and data center team’s worst nightmare—they often require that the network be “dumbed” or retrofitted to accommodate security approaches.
This is why Cisco has embraced security as part of an end-to-end architecture. Cisco builds in security functions as part of the network fabric to help ensure an automated and resilient infrastructure. Our latest Secure DC bundle pairs the industry-leading router (Nexus 7000) and firewall (ASA 5585) to provide the backbone for a dynamic network with which to accelerate the adoption of newer and more capable applications and services. Various mix-and-match configuration options make this bundle ideal for data centers or any size industry. Read More »
Tags: asa 5585, Cisco Security, firewall security, multi-scale security, Nexus 7000, secure data center, small business network security
Lynn University is a 50-year old private, coeducational institution located in Boca Raton, Florida. So how was this fairly small and quiet school selected to host the final 2012 presidential debate? It’s booming with technological innovation.
The school has long held the belief that student collaboration and sharing of knowledge is vital to the learning process, but realized with time, they need to increase student support through technology. To move to a 1-to-1 program entailed giving each student an iPad and overhauling its network environment. In late 2011, as this transformation was underway, Lynn discovered that they would also soon be the youngest school to ever host a presidential debate.
This meant the school had less than a year to undergo a complete technical refresh, so Lynn turned to Cisco for help. University CIO Chris Boniforti summed up his decision to select Cisco by saying “All of our diverse technical requirements, for both the debate and the university, could be done under one umbrella, with one vendor, and that was Cisco.”
This umbrella of technology included Cisco wireless solutions, Cisco Unified Computing System and Cisco security, voice and IP communications. Cisco joined forces with longtime partner Modcomp to deliver a solution the university could use well beyond the presidential debate. The result: A successful implementation that resulted in a “technically smooth” debate.
It’s important to note this project didn’t shut down once the debate was over. Today, the school is committed to providing a mobile platform for its entire faculty and students by the time the newest crop of freshmen arrive in fall later this year. The addition of the new business school will include lecture capture and resources-sharing tools, including video. Now embedded in the teaching environment, this benefit would not have been possible without Lynn’s new Cisco network.
I’m personally impressed with the university’s commitment to technology. They are a great example for other small schools looking for cost-effective innovation. What do you think? Is your school ready for this kind of transformation?
Tags: Chris Boniforti, Cisco Security, Cisco UCS, Cisco Unified Computing System, IP communications, lecture capture, Lynn University, Modcomp, presidential debate, Voice