Cisco Blogs


Cisco Blog > Enterprise Networks

Using TrustSec to simplify Virtual Desktop Infrastructure (VDI) deployment

We recently discussed the perfect IT storm that is currently brewing in business. BYOD, Unified Access, Video, the Many Clouds, SDN… all happening at once, on current infrastructure, and yet demanding more.

Some of the comments you made further emphasized the need to have an architectural approach.

VXI/VDI deployments are no exception.

Discussing VDI deployments with our customers in EMEAR, two things really are at the centre of our discussions from an infrastructure standpoint.

–         Security, which I’ll  discuss in today’s post.

–         Latency and user experience.  Two recent posts, here and here, provide great insight on how to tackle this challenge.

I have therefore asked Steinthor Bjarnason (sbjarnas@cisco.com), Senior EMEAR Security Consultant, based out of Norway, to give me his perspective.  He has 15 year experience in the security space and his perspectives are drawn from numerous customer projects, both in the Enterprise and the Service Provider space. Read More »

Tags: , , , ,

Question: Are you PCI Compliant? Are you Secure? Part 2 of 2

Last week, we sat down with Bart McGlothin and Christian Janoff from Cisco’s security team to discuss PCI Security for Retail to better understand “What is PCI Compliance?” and “How does that affect Retailers?”

As a quick re-cap: PCI Compliance is a 12-step process to secure credit cards. Any retailer that accepts credit card payments must be “PCI Compliant” (i.e., follow those 12 steps). Compliance is enforced by the Retailer’s acquiring bank (the financial institution that processes the credit card payments for the Retailer).

Q. So, we know that Retailers need to be PCI Compliant. How can Cisco help?

A. Cisco has a PCI design and implementation guide for merchants to use.  It really stands alone in the industry because it provides holistic guidance in three key ways:

Read More »

Tags: , , , , ,

T-Mobile Helps Drive New Standard to Simplify IPv6 Deployment

T-Mobile USA has been one of the first carriers to widely deploy IPv6, seeking to overcome the lack of IPv4 addresses and to lay the foundation for their network for the Internet of Everything. However, one of the headaches they’ve faced is that some applications which work fine over IPv4 don’t play nicely with IPv6. That’s a real challenge for service providers, impacting their ability to migrate completely away from IPv4 and complicating their network operations.

T-Mobile helped Read More »

Tags: , , , , , , ,

Data Center Metrics to Mull Over

How well is your Data Center performing?

How do you know?

I went shopping for a car last year and was pleased to see several models equipped with real-time displays of their miles per gallon performance.  That’s a great feature, in my opinion, because it offers drivers up-to-the-moment insight into how efficiently their cars are operating.

Read More »

Tags: , , , , , ,

Security Geeks and Wonks Unite!

Are we heading to a day of reckoning, where the forces of cyber crime overwhelm and erase the good things that information technology delivers? If we head down our current path of incremental, individualized approaches to cyber security, the answer is “Yes.” But I’m enough of an optimist to think that if the IT and security geeks and wonks of the world can unite, share information, work hard, and not worry about who gets the credit, we stand a fighting chance. Read More »

Tags: , , , ,