Cisco Blogs


Cisco Blog > Security

Data Security Through the Cloud [summary]

Is the combination of cloud computing and mobility a perfect storm of security threats?

Actually, yes. And you should prepare for them as if there is a storm coming.

As businesses become increasingly mobile, so does sensitive data. In fact, in a recent survey conducted by ESG,

31% of security professionals say that the biggest risk associated with cloud infrastructure services is, “privacy concerns associated with sensitive and/or regulated data stored and/or processed by a cloud infrastructure provider.”

Data Security Through the Cloud

 

With cloud-based services, it is key to have visibility into applications and provide consistent experience across devices accessing the web and cloud applications. More users are leaving the standard PC behind and engaging cloud applications through a mobile device, making application-layer security and user access security critical. Smartphones and tablets are able to connect to applications running anywhere, including public, private and hybrid cloud applications, opening your data to potential attacks. Security professionals need assurances that their cloud security provider will appropriately secure customer data while ensuring availability and uptime.

 

The conversation is no longer if you’ll be attacked, but when. And will you be prepared?

Read the full article: Data Security Through the Cloud

Tags: , , , , , , , , , , , ,

Data Security Through the Cloud

Is the combination of cloud computing and mobility a perfect storm of security threats?

Actually, yes. And you should prepare for them as if there is a storm coming. As businesses become increasingly mobile, so does sensitive data. In fact, in a recent survey conducted by ESG,

31% of security professionals say that the biggest risk associated with cloud infrastructure services is, “privacy concerns associated with sensitive and/or regulated data stored and/or processed by a cloud infrastructure provider.”

Data Security Through the CloudDid you know:

16 billion web requests are inspected every day through Cisco Cloud Web Security

93 billion emails are inspected every day by Cisco’s hosted email solution

 200,000 IP addresses are evaluated daily

400,000 malware samples are evaluated daily

33 million endpoint files are evaluated every day by FireAMP

28 million network connects are evaluated every day by FireAMP

Read More »

Tags: , , , , , , , , , , , ,

Cisco at CCBN: Transforming Video Experiences

By Hanh Tu, Vice President, Great Chinahanh tu

CCBN (China Content and Broadcasting Network), the biggest cable industry trade show in Asia is happening between March 20-22, 2014 in Beijing, China. Cisco will be showcasing many cutting edge innovations around cloud, mobility and video to our customers and partners at the show.

As we enter the Internet of Everything era, service providers and media companies face challenges in finding better models to monetize the video ecosystems. For example, MSOs need to identify ways to benefit more from the booming internet video service delivery models, or be left behind.  Cisco understands and embraces the customers’ challenges, and moves together to turn them into opportunities and innovations. Customers and partners will be able to experience Read More »

Tags: , , , , , , ,

#EngineersUnplugged S5|Ep1: Role and Policy Based Control

March 5, 2014 at 10:46 am PST

We’re back with an all-new season of Engineers Unplugged--more unicorns, more technology, and more selfies than even the Oscars have to offer.

Season 5 kicks off with a bang--role-based access control and policy management discussion brought to you by Nick Howell (@that1guynick) and Joe Onisick (@jonisick). What are the implications for hybrid cloud? What are the predictions for network and storage? How is this related to ACI?

Watch and learn:

Those are some well-maned unicorns, more hair than substance.

Unicorns with lovely manes courtesy of Nick Howell and Joe Onisick

Unicorns with lovely manes courtesy of Nick Howell and Joe Onisick

**The next shoot is at Varrow Madness, Charlotte, NC, March 20, 2014! Contact me now to become internet famous.**

This is Engineers Unplugged, where technologists talk to each other the way they know best, with a whiteboard. The rules are simple:

  1. Episodes will publish weekly (or as close to it as we can manage)
  2. Subscribe to the podcast here: engineersunplugged.com
  3. Follow the #engineersunplugged conversation on Twitter
  4. Submit ideas for episodes or volunteer to appear by Tweeting to @CommsNinja
  5. Practice drawing unicorns

Join the behind the scenes by liking Engineers Unplugged on Facebook.

Tags: , , , , , , ,

CIO or IT Services Broker?

In the heart of the overall shift from cloud computing as an isolated project to a central IT strategy, a particular tenet is reigning supreme: hybrid IT strategies. As cloud computing continues to evolve, new technologies are emerging to support the dynamic creation of cloud services. CIOs are increasingly feeling the need to deal with hybrid environments.  But how? Enter the rise of hybrid IT process models and the positioning of IT as a service broker.

Gartner recently identified hybrid cloud and IT as a Service broker (ITaaSB) in its Top 10 Strategic Technology Trends; they also highlighted how to move to an ITaaSB environment in their research titled: Top 10 Technology Trends, 2013: Cloud Computing and Hybrid IT Drive Future IT Models.

 
ITServiceBroker

But what exactly is an IT services broker? And how can we help make this shift?

Read More »

Tags: , , , ,