Maybe you’re like me, looking for any excuse to hop on a plane to Boston! In this case, I happen to have a good one, Red Hat Summit, which kicks off on June 11th.
Cisco is proud to be a Platinum Sponsor for the event and we’re showing up in full force with a larger booth, more demos, a Cisco keynote, breakout, and a number of new solution areas that we plan to showcase. We’ll have a number of product and solution experts available to share our view on how Cisco Solutions, hosted on UCS infrastructure, are building a better data center.
One presentation you should be sure not to miss is the Cisco Keynote on Wednesday, June 12th at 9:30 AM with Ram Appalaraju, Vice President of Technology, Products and Solutions Engineering at Cisco. It’s safe to say, Ram has an important role at Cisco. He is essentially responsible for delivering Cisco’s Unified Data Center strategy in the form of products and solutions. This will certainly prove to be a presentation not to be missed!
In addition, Han Yang, Product Manager for Cisco Nexus 1000V, will discuss the Nexus 1000V on KVM with OpenStack Integration. Since Han was one of the original Engineers developing the Nexus 1000V, this makes him uniquely qualified to present this breakout. This session will be held in room 312 on Thursday, June 13th at 1:20 pm.
Please see below for the four key solutions that Cisco is showcasing at the Partner Pavillion:
Read More »
Tags: Big Data, Blade Servers, Cisco UCS, Cloud Computing, data center, Nexus 1000v, OpenStack, rack server, Red Hat Summit, unified computing, unified computing system
This is the first in a two-part blog series that examines the opportunities that cloud-based services offer to law enforcement agencies—along with the challenges of this fundamental shift in the way information resources are managed.
Police forces have a well-established culture of owning and managing systems directly founded on concerns about security and control of access to information. Three trends, however, make this position unsustainable:
- Traditional models for acquiring and running systems, which slow the pace of innovation
- Increasing need to form partnerships with other police agencies, public-sector bodies, and the private sector. Partnership depends on information sharing and open approaches to developing systems.
One of the most radical—and successful—cloud-based public-safety and security services is Facewatch. Using a network-based model, Facewatch provides an online reporting tool that allows U.K. businesses and citizens to report crimes and attach video evidence. The service enables crime victims to cancel credit cards instantly through Facewatch’s partners; allows users to share images of wanted people; and provides a channel for feedback from the police on the outcomes of cases.
Facewatch offers immediate benefits to the public, businesses, and law enforcement:
- Citizens: ease of reporting and rapid management of associated processes
- Businesses: less time required to deal with incidents
- Law enforcement: reduces or eliminates the need to interact directly with premises to recover video footage
For all users, there is greater transparency about processes and reporting on outcomes, as well as the ability for communities to share information about wanted persons and crime trends.
Read More »
Tags: Cisco, cloud, Cloud Computing, Facewatch, IBSG, law enforcement, network, networking, police, Public Safety, security, social media, technology, United Kingdom
By Chris Ortbals, Senior Vice President, Product Management , Cbeyond Inc.
At the company’s inception in 1999, Cbeyond saw the potential in using IP technology to deliver enterprise-class productivity enhancing communications services to small and medium-sized businesses (SMBs). Today, as a cloud and communications services provider, Cbeyond continues to live up to its brand promise as the technology ally to small and mid-sized businesses,
As Cbeyond witnessed the business value large enterprises were achieving from cloud computing, we sought to devise a new strategy and products that would offer our SMB customers the same benefits in a secure, reliable and affordable way. Our competitors typically offer SMBs a commodity-grade or exclusively self-service type of cloud offering. However, we wanted to go further and provide a cloud service that would not only support end-to-end enterprise-grade production applications but also deliver a much superior experience for SMBs.
Our initial expansion into the cloud came with the 2010 acquisitions of MaximumASP, a hosting provider, and Aretta, a network-hosted VoIP provider. We integrated and enhanced the technologies we acquired into TotalCloud, our flexible and highly customizable cloud services platform.
We’ve had a successful relationship with Cisco since 1999, when we launched the first Cisco-powered 100% IP network delivering services to SMBs. So naturally we considered partnering with Cisco as we made the move into the cloud services market.
In the search for the right partner, we did our due diligence and evaluated three vendors. However, we found that only Cisco could help us deploy, provision, test and implement a cloud platform that not only met our requirements but that could also be launched within our aggressive timeframe.
Our TotalCloud Data Center, a service platform for public and private cloud solutions, is powered by Cisco technology, with Cisco Unified Computing System™, Cisco UCS Blade servers, and Cisco Nexus switches. This solution provides us with a repeatable, scalable architecture that can be used in our current and future data centers.
We collaborated with Cisco Services, for Data Center Optimization and Network Optimization Services since network performance is critical to running production applications in the cloud.
Other vendors would have pieced a cloud offering together from multiple sources so going with Cisco as a single vendor offered a clear advantage over using multiple vendors to accomplish the same task. Also, many cloud platforms are built like an island with limited integration into other products used by a service provider, however the Cisco offering is the complete opposite. Cisco has architected its technology in partnership with us so that their technology not only supports how we want our business to operate but how we deliver services and value to our entire customer base.
And partnering with Cisco paid off. With the help of Cisco Services, Cbeyond’s time-to-market for our cloud offering was reduced by two months, and we were able to secure new revenue opportunities earlier than expected.
Read more in this new case study: Services Provider Builds New Cloud Infrastructure for SMBs
Tags: Cbeyond, Cisco, Cloud Computing, service providers, services, smb
On April 10, 2013, a collective of politically motivated hacktivists announced a round of planned attacks called #OPUSA. These attacks, slated to begin May 7, 2013, are to be launched against U.S.-based targets. #OPUSA is a follow-up to #OPISRAEL, which were a series of attacks carried out on April 7 against Israeli-based targets. Our goal here is to summarize and inform readers of resources, recommendations, network mitigations, and best practices that are available to prevent, mitigate, respond to, or dilute the effectiveness of these attacks. This blog was a collaborative effort between myself, Kevin Timm, Joseph Karpenko, Panos Kampanakis, and the Cisco TRAC team.
If the attackers follow the same patterns as previously witnessed during the #OPISRAEL attacks, then targets can expect a mixture of attacks. Major components of previous attacks consisted of denial of service attacks and web application exploits, ranging from advanced ad-hoc attempts to simple website defacements. In the past, attackers used such tools as LOIC, HOIC, and Slowloris.
Publicly announced attacks of this nature can have highly volatile credibility. In some cases, the announcements exist only for the purpose of gaining notoriety. In other cases, they are enhanced by increased publicity. Given the lack of specific details about participation or capabilities, the exact severity of the attack can’t be known until it (possibly) happens. Read More »
Tags: advisories, ASA, botnet, botnets, Cisco Security, Cloud Computing, cloud security, data center security, DDoS, exploits, firewall, incident response, IPS, IPS signatures, malware, mitigations, security, targeted attacks, TRAC, vulnerability
Great challenges can bring great opportunities to any business, and with the inevitability of cloud on the horizon, IT organizations will need to embrace this change. Taking the first, second or even third step can be scary, but the return on taking such risks will pay off so long as the IT organization champions the deployment.
Cisco itself has also had to face these risks of deploying cloud, and has already embarked on the private cloud (IaaS) journey —all the way from virtualizing the compute, network, and storage resources to integrating change management, and metering services for “pay as you use”.
Some of the challenges that we encountered typical that other IT organizations could face in cloud adoption were:
• Ensuring security. Each cloud solution has to be matched to appropriate security capabilities. The new capabilities may include centralized management (vs. trying to manage firewalls on ever-changing edges or trying to manage security on each endpoint), scalable multi-tenant architectures, real-time threat analysis and dynamic mitigation delivery.
Read More »
Tags: Cisco cloud, Cisco Partner, cloud, Cloud Computing, cloud services, government it, security