As the demand for next-generation data center services increases, organizations have embraced virtualization and cloud-computing technologies that require security architectures to be more dynamic, automated, and services-oriented. Most network security technologies have not kept pace, they are static and fail to protect against modern threats. Additionally, siloed security technologies are a networking and data center team’s worst nightmare—they often require that the network be “dumbed” or retrofitted to accommodate security approaches.
This is why Cisco has embraced security as part of an end-to-end architecture. Cisco builds in security functions as part of the network fabric to help ensure an automated and resilient infrastructure. Our latest Secure DC bundle pairs the industry-leading router (Nexus 7000) and firewall (ASA 5585) to provide the backbone for a dynamic network with which to accelerate the adoption of newer and more capable applications and services. Various mix-and-match configuration options make this bundle ideal for data centers or any size industry. Read More »
Lynn University is a 50-year old private, coeducational institution located in Boca Raton, Florida. So how was this fairly small and quiet school selected to host the final 2012 presidential debate? It’s booming with technological innovation.
The school has long held the belief that student collaboration and sharing of knowledge is vital to the learning process, but realized with time, they need to increase student support through technology. To move to a 1-to-1 program entailed giving each student an iPad and overhauling its network environment. In late 2011, as this transformation was underway, Lynn discovered that they would also soon be the youngest school to ever host a presidential debate.
This meant the school had less than a year to undergo a complete technical refresh, so Lynn turned to Cisco for help. University CIO Chris Boniforti summed up his decision to select Cisco by saying “All of our diverse technical requirements, for both the debate and the university, could be done under one umbrella, with one vendor, and that was Cisco.”
This umbrella of technology included Cisco wireless solutions, Cisco Unified Computing System and Cisco security, voice and IP communications. Cisco joined forces with longtime partner Modcomp to deliver a solution the university could use well beyond the presidential debate. The result: A successful implementation that resulted in a “technically smooth” debate.
It’s important to note this project didn’t shut down once the debate was over. Today, the school is committed to providing a mobile platform for its entire faculty and students by the time the newest crop of freshmen arrive in fall later this year. The addition of the new business school will include lecture capture and resources-sharing tools, including video. Now embedded in the teaching environment, this benefit would not have been possible without Lynn’s new Cisco network.
I’m personally impressed with the university’s commitment to technology. They are a great example for other small schools looking for cost-effective innovation. What do you think? Is your school ready for this kind of transformation?
Add this to your list of parties spoilt by the Internet revolution: national sovereignty.
We all know that the borderless nature of the Internet is stretching longstanding technical and legal definitions. But recently, my colleague Richard Aceves and I got to talking about the mish-mash that social media is making of culture, language, and national identity. It should come as no surprise that cultures and languages are being diluted by the global online discussion, in the same way that the advent of television and radio had a dampening effect on certain regional spoken colloquialisms and accents. Richard will examine some cultural questions in a forthcoming blog post, while I’ll be discussing the psychological impact on national sovereignty.
Judging by the proliferation of Internet policies and legislation, it is pretty clear that bureaucrats and politicians in capital cities around the world are worried that the Internet (with special thanks to social media) is simultaneously eroding both their authority and their national identity. Read More »
“Think globally, act locally” is a phrase, now cliché, because it expresses an incontrovertible and immediately graspable truth. The global-local concept applies when it comes to mobilizing globally-collected cyber threat data, which in turn informs local IT operations against hackers and criminals. Of note, data collections spanning the globe don’t appear magically out of the blue, nor can they be engineered by just “anybody.” This crowd-sourced data must come from IT operations across the world to be collected, analyzed, and actioned. It’s a 24-hour cycle requiring the collective actions of organizations contributing to a mutually beneficial result. I have more to say about this in a video blog post on YouTube.
Attendees will perform two roles. First, as a Security Practitioner who will secure and harden devices within an organization’s network infrastructure, and second, as a Security Incident Response Investigator who must correctly detect, classify, and prevent threats targeting a network by configuring and deploying advanced network threat defenses and countermeasures. Read More »