Cisco Blogs


Cisco Blog > Data Center and Cloud

Drivers for Managed Security and what to look for in a Cloud Provider

The first blog of this series discussing the role of data security in the cloud can be found here.

In 2014 and onward, security professionals can expect to see entire corporate perimeters extended to the cloud, making it essential to choose a service provider that can deliver the security that your business needs.

While organizations can let business needs trade down security we’ve begun to see how a recent slew of data breaches are encouraging greater vigilance around security concerns. For example, a recent CloudTweaks article highlights the need for organizations to be confident in their choice of cloud providers and their control over data. IT leaders have the power to control where sensitive information is stored. They also have the power to choose how, where and by whom information can be accessed.

An important driver in mitigating risk and increasing security is to ask the right questions.

An important driver in mitigating risk and increasing security is to ask the right questions.

Institute Control By Asking the Right Questions

However, adding to fears about ceding the control of data to the cloud is lack of transparency and accountability about how cloud hosting partner/ providers secure data and ensure a secure and compliant infrastructure.  Cloud consuming organizations often don’t ask enough questions about what is contained in their  service-level agreements, and about the process for updating security software and patching both network and API vulnerabilities.

Organizations need reassurance that a cloud provider has a robust set of policies, process and than is using automated as well as the latest technologies to detect, thwart and mitigate attacks, while in progress as well as be prepared to mitigate after an attack.

 

Read More »

Tags: , , , , , , , , , , , , , , , , ,

Summary: Announcing The Cisco IoT Security Grand Challenge

March 12, 2014 at 4:51 pm PST

Despite its overwhelming business benefits, the Internet of Things (IoT) also significantly increases security risks.  That’s why Cisco is pleased to announce the IoT Security Grand Challenge, an industry-wide initiative to bring the global security community together to secure the IoT, and deliver intelligent cybersecurity for the real world – before, during, and after an attack. Winners will be awarded $50,000 in prize money and be publicly announced at the IoT World Forum this Fall!

Read the full Fame and Fortune Awaits: The Cisco IoT Security Grand Challenge blog post to learn more.

Tags: , , , , , , ,

Data Security Through the Cloud [summary]

Is the combination of cloud computing and mobility a perfect storm of security threats?

Actually, yes. And you should prepare for them as if there is a storm coming.

As businesses become increasingly mobile, so does sensitive data. In fact, in a recent survey conducted by ESG,

31% of security professionals say that the biggest risk associated with cloud infrastructure services is, “privacy concerns associated with sensitive and/or regulated data stored and/or processed by a cloud infrastructure provider.”

Data Security Through the Cloud

 

With cloud-based services, it is key to have visibility into applications and provide consistent experience across devices accessing the web and cloud applications. More users are leaving the standard PC behind and engaging cloud applications through a mobile device, making application-layer security and user access security critical. Smartphones and tablets are able to connect to applications running anywhere, including public, private and hybrid cloud applications, opening your data to potential attacks. Security professionals need assurances that their cloud security provider will appropriately secure customer data while ensuring availability and uptime.

 

The conversation is no longer if you’ll be attacked, but when. And will you be prepared?

Read the full article: Data Security Through the Cloud

Tags: , , , , , , , , , , , ,

Data Security Through the Cloud

Is the combination of cloud computing and mobility a perfect storm of security threats?

Actually, yes. And you should prepare for them as if there is a storm coming. As businesses become increasingly mobile, so does sensitive data. In fact, in a recent survey conducted by ESG,

31% of security professionals say that the biggest risk associated with cloud infrastructure services is, “privacy concerns associated with sensitive and/or regulated data stored and/or processed by a cloud infrastructure provider.”

Data Security Through the CloudDid you know:

16 billion web requests are inspected every day through Cisco Cloud Web Security

93 billion emails are inspected every day by Cisco’s hosted email solution

 200,000 IP addresses are evaluated daily

400,000 malware samples are evaluated daily

33 million endpoint files are evaluated every day by FireAMP

28 million network connects are evaluated every day by FireAMP

Read More »

Tags: , , , , , , , , , , , ,

Inside Cisco IT Takes You on Our Security Journey

Would you jump on a horse without consulting someone else who is at least somewhat familiar with horses?  You know, like a cowgirl or boy?

Probably not.

At least not if you’re interested in staying in the saddle versus tumbling to the never-soft earth.

While Cisco IT doesn’t have any expertise in horseback riding (I mean, you are welcome to ask me for a couple of pointers, but I’m not promising results), we DO have expertise in a variety of challenges IT departments face on a regular basis.

Like Security.

Last week, we hosted a live Inside Cisco IT Webinar on our Security Journey with two of our own Cisco IT Security Experts.  If you missed it, you should definitely give the recording a gander.

After checking out the recording, this is what you should come away with:

Security Webinar Key Takeaways

Tags: , , , , , , , ,