Cisco Blogs


Cisco Blog > Security

Duct Tape and Chewing Gum Isn’t Enough: Cloud and Virtual Environments Require Specialized Security

By now, just about everybody who works in any area of IT knows that moving multiple workloads into one physical server optimizes server usage, minimizes procurement and operational costs, and increases overall efficiency of the network. As a result, virtualization technology remains one of the hottest topics in IT today, due to its overwhelming benefits to organizations of all sizes. Read More »

Tags: , , , , , ,

Announcing the Cisco ASA 1000V Cloud Firewall

This week Cisco is announcing the ASA 1000V cloud firewall, a product that we previewed at VMworld last month and in an earlier blog post. This video provides a very high level introduction to our latest virtual security product.

Read More »

Tags: , , , , ,

Cisco Security Manager UCS Server Bundles Reduce Complexity and Time to Market

It’s no secret that network threats have grown significantly over the past several years – in number, as well as complexity. This growth continues to place an overwhelming burden on IT resources, who have to combat these threats on a daily basis. These guys already have a rough job of just keeping up with the sheer volume and variety of threats … but also making them go through multiple hoops and internal approvals to procure and piece together the solution from different vendors is enough to push a lot of folks over the proverbial edge!

Read More »

Tags: , , , , ,

Borderless Networks Will Set You Free! – Telework for Government

There is a lot of buzz out there right now about Telework Solutions for Government as many agencies are making the transition that so many Corporations have already completed.  Personally, I haven’t worked full time in an office since pre-1996 and can’t imagine wasting that much time every day on preparations and commuting for no real purpose other than donuts, coffee and the latest office gossip.

Work is an activity, not a location in today’s professional world with pervasive networking capabilities and the Government is getting on board under the leadership of the current administration.

If you want to get a feel for the progress and momentum around this,  check out the public/private partnership at the Telework Exchange site focused on eliminating the Telework Gridlock.  Cisco is one of the sponsors of this activity because we see the value, have lived it for better than 15 years,  and can offer solutions to help make this a reality for our Government customers. Read More »

Tags: , , , , , , , ,

Even Security Administrators Deserve a Break – Part 2 of 2

In my last post on this topic, I highlighted just how true the words “Work is no longer a place you go, but what you do” really are. We now have the ability to work anytime, anywhere, using any device. As easy as this has made the lives of workers all over the world, it’s made the lives of security administrators immensely difficult. Providing secure access to the corporate network in a borderless world, while still somehow keeping out the bad stuff, has caused traditional security policies to become increasingly difficult to configure, manage, and troubleshoot – the source of inordinate amounts of pain for security administrators.

That’s why Cisco has introduced identity-based firewall security as a new capability of the ASA platform. As the first installation of what will soon become full context-aware security, identity-based firewall security enables security administrators to utilize the plain language names of users and groups in policy definitions. Rather than authoring and managing the growing list of IP addresses to cover every possible location, device, or protocol that may be required for secure access to the network, identity-based firewall security enables security administrators to grant access to “Jeff.” Regardless of where I am or what I’m using for access, I’m still Jeff… so in the simplest case, my administrator can literally write one policy to provide “Jeff” access to the corporate network, rather than six different IP addresses for all the instantiations of Jeff.

Read More »

Tags: , , , ,