[ed. Note: This post was updated 7/9/2014 to include new information not available to the author at the time of original publishing]
I just returned from the Gartner Security Summit at the Gaylord Resort in National Harbor Maryland. Each morning I took my run along the Potomac River and passed this sculpture of a man buried in the sand.
In speaking with many IT executives they expressed specific concerns around their IT security, and this sculpture of the “man in the sand” took on new meaning for me. I could see how they might similarly feel overwhelmed and buried given their limited resources and the abundance of threats to their environments. Yes, I’ve been in this industry too long! Anyway, throughout all of my conversations it was abundantly clear that people were looking for a new way to approach securing their networks and applications. Customers are recognizing that unsecured access to the network is a critical threat vector; however, when leveraged properly, the network itself also provides a significant platform that offers comprehensive protection to close those gaps. So, what do I mean by that?
The network uniformly sees and participates in everything across the threat continuum, whether before, during or after an attack. If we can leverage the insights and inherent control the network provides, IT organizations can truly augment their overall end-to-end security across this continuum. If done correctly, this augmentation can happen without investing a large amount of time, energy, and resources in filling all the gaps to secure their environments – regardless of legacy network, endpoint, mobile, virtual, or cloud usage models
Cisco strongly believes that the network must work intimately with various security technologies in a continuous fashion to offer protection for networks, endpoints, virtual, data centers and mobile.
Given Cisco’s breadth and depth of security, we did not have room to exhibit our networking devices. However, within much of our networking (and even security) offerings, we have embedded security capabilities that provide more comprehensive protection across the entire threat continuum.
An example of this is Cisco TrustSec embedded network access enforcement, which provides network segmentation based on highly differentiated access policies. Cisco TrustSec works with Cisco ISE to provide consistent secure access that is mapped to IT business goals. Cisco ISE and TrustSec are part of the Cisco Unified Access solution and leverage a superior level of context and simplified policy management across the entire infrastructure in order to ensure that the right users and devices gain the right access to the right resources at any given time.
Cisco’s integrated approach to security reduces complexity, while providing unmatched visibility, continuous control and advanced threat protection, which, in turn, allows customers to prioritize more efficiently and act more quickly – before, during, and after an attack. Through Cisco’s New Security Model, we help you achieve a more pleasant experience and get you dug out of the sand. To learn more and go beyond just a shovel and pail, go to Cisco’s Security Page.
Tags: @CiscoSecurity, Gartner, GartnerSecurity#, ISE, malware, mobile security, security, Sourcefire, threats
How can leaders manage the transition to a cloud services broker? Check out the new Gartner newsletter to learn more.
Is your IT department currently acting as a Cloud services broker?And what exactly is a Cloud services broker?
As our world of many clouds continues to evolve, increased opportunities exist for IT departments to move from the traditional “siloed” working environments to play a more critical role in corporate planning strategies.
Aligning IT and business objectives are duties handled by an IT services broker, who is usually the company CIO.
This role has become increasingly recognized as IT-as-a-Service (ITaaS) becomes a piece of the intercloud fabric.
The time is now for corporations to begin viewing their IT departments as more than the group that resets passwords and helps new-hires with their computer set-ups.
In order to manage the cloud transition and embrace the role of cloud services brokers, CIOs and IT leaders should consider these five steps:
1) Develop your future thinking and let go of the idea of how your IT department has done things in the past and think about what processes can be reengineered or what new capabilities need to be developed. Your IT group is best able to identify technology gaps in an organization’s processes as CIOs contend with hybrid cloud environments.
2) Create your Infrastructure-as-a-Service (IaaS) Building Block and ensure it’s agile, so your IT department can manage infrastructure services in a highly automated fashion and deliver to users in just minutes. By enabling a hybrid cloud environment in the IaaS layer, IT can more easily play the role of cloud services broker.
3) Add the Platform-as-a-Service (PaaS), which uses the agility in the IaaS foundation. Ultimately, this delivers greater efficiencies and flexibility in the deployment and deployment of cloud workloads. Without PaaS, development and testing of initiatives would require dedicated capacity to be allocated by IT.
4) Ensure required security standards. The SaaS and Infrastructure Security building block is where IT’s ability to serve as a cloud service broker plays a critical role and for an organization’s integrity, cloud-based services are best managed by them as a one cohesive infrastructure.
5) Make your vision a reality and implement transformational change! Now that you’ve assembled all the necessary building blocks, find a trusted partner to help you define and implement your vision. Tools like Cisco Domain Ten can help your IT department create evaluation criteria that helps them play their role as cloud services broker.
If you want to learn more about how to prepare for growing cloud workloads, how to evolve your IT department to harness the true potential of the cloud, and how to develop a more strategic approach to IT operations and service management, be sure to :
Watch the Cisco Intercloud Workload Migration Webcast (Available on demand).
Cisco Live, May 18-22
or follow the conversation online @CiscoCloud with #CLUS and #CiscoCloud.
Watch the Cisco Live Opening Session and Keynote by John Chambers on Monday, May 19 at 3:30 p.m. PDT.
Watch the Cisco Live Technology Business Vision keynote by Rob Lloyd on Tuesday, May 20 at 10:00 a.m. PDT.
Register today for the Cisco Powered Cloud Day at Cisco Live on Monday, May 19. The insightful day will focus on opportunities and challenges that can be addressed with cloud.
Watch the Cisco Live Cloud Technology Trend Keynote – Aligning Your Strategy and Business for Cloud Success by Dr. Gee Rittenhouse and Faiyaz Shahpurwala on Tuesday, May 20 – 1:30 p.m. PDT.Visit
Cloud Executive Perspectives to get additional cloud insights for IT leaders.
Tags: CIO, Cisco, Cisco cloud, CiscoCloud, cloud, Cloud Computing, CLU, Domain Ten, domain ten framework, Gartner, InterCloud, intercloud fabric, Kenneth Owens, Parag Parekh, Rochelle Barnett, Scott Clark
The Internet of Everything (IoE) is changing the business and IT landscape, fueling unprecedented growth and disruption. As such, just thinking about cloud deployment is not enough. Organizational leaders need a cloud strategy to help future-proof their business and better meet objectives.
In fact, according to Gartner, organizations that continually monitor cloud computing trends and subsequently update the enterprise’s cloud strategy, will likely avoid costly mistakes and garner the most value from market opportunities over the next few years.
As CXOs adopt cloud strategies, what key trends should they keep in mind?
Here’s a short list for consideration:
Trend #1: Prepare for Growing Cloud Workloads
Today’s world isn’t just a world of many clouds, but also a world of growing cloud workloads.
According to Cisco’s Global Cloud Index:
Annual global cloud IP traffic will reach 5.3 zettabytes by the end of 2017. By 2017, global cloud IP traffic will reach 443 exabytes per month (up from 98 exabytes per month in 2012).
Global cloud IP traffic will increase nearly 4.5-fold over the next 5 years. Overall, cloud IP traffic will grow at a CAGR of 35 percent from 2012 to 2017.
Global cloud IP traffic will account for more than two-thirds of total data center traffic by 2017.
In this video, find out how these growing cloud workloads are driving IT to become a broker of cloud technologies.
Read More »
Tags: #CLUS, CIO, Cisco, cisco live, Cisco Live! 2014, cloud, Cloud Computing, Gartner, IDC, InterCloud, Internet of Everything, IoE
The use of hybrid cloud or Intercloud technology is growing increasingly popular. A recent study supports that IT managers want a mix of public and private cloud in their enterprises. In fact, 60% of the 400 enterprises surveyed see the hybrid cloud model as the way to go.
And for good reason: The same secure, open and flexible solutions that can be found within your private data center can be implemented with a hybrid cloud set-up, providing the best of both worlds: private cloud control and flexible public clouds. And when the need arises to expand your data center, creating an Intercloud to extend your own data center and cloud capacity when you need it is an excellent option for any business of any size.
Next week, we invite you to join our informative cloud webcast: Cisco Solutions for Open and Secure Intercloud Workload Migration. You’ll gain insight as to how your organization will benefit from an Intercloud approach. The conversation will be focused on how your business can:
- Extend your company’s capabilities, store more data and increase resources as you need them. Data centers cost to both build and operate, and InterCloud makes the public cloud an extension of your cloud.
- Maintain your sense of security by applying your same quality of service restrictions and policies to your hybrid cloud. You may be “renting” the capacity, but for all intended purposes, you own it.
- Keep your current cloud provider of choice and even link to more than one if you choose. The same traits are replicated in each instance of your data center.
When Cisco’s Global Intercloud was introduced, it completely changed the direction of how we utilized the hybrid cloud. It also showed us the need that CIOs across the globe had for a customizable, secure and high-performance data center expansion solution. And now is your chance to see why we’ve answered with Intercloud.
Registration is open, mark your calendar and join us for this webcast (available on demand):
Cisco Solutions for Open and Secure Intercloud Workload Migration. Join our webcast to learn how the Cisco InterCloud solution helps ensure the same network security, quality of service (QoS), and access control policies previously enforced in the data center are implemented in the public cloud. Available on demand.
Cisco Solutions for Open and Secure Intercloud Workload Migration
Wednesday, May 14
9:00 a.m. Pacific Time / 12:00 pm Eastern Time
Read More »
Tags: #CLUS, Cisco, cisco intercloud, CiscoCloud, cloud, Cloud Computing, Fabio Gori, Gartner, Hybrid Cloud, InterCloud, Rackspace, rob lloyd, webcast
The first blog of this series discussing the role of data security in the cloud can be found here.
In 2014 and onward, security professionals can expect to see entire corporate perimeters extended to the cloud, making it essential to choose a service provider that can deliver the security that your business needs.
While organizations can let business needs trade down security we’ve begun to see how a recent slew of data breaches are encouraging greater vigilance around security concerns. For example, a recent CloudTweaks article highlights the need for organizations to be confident in their choice of cloud providers and their control over data. IT leaders have the power to control where sensitive information is stored. They also have the power to choose how, where and by whom information can be accessed.
An important driver in mitigating risk and increasing security is to ask the right questions.
Institute Control By Asking the Right Questions
However, adding to fears about ceding the control of data to the cloud is lack of transparency and accountability about how cloud hosting partner/ providers secure data and ensure a secure and compliant infrastructure. Cloud consuming organizations often don’t ask enough questions about what is contained in their service-level agreements, and about the process for updating security software and patching both network and API vulnerabilities.
Organizations need reassurance that a cloud provider has a robust set of policies, process and than is using automated as well as the latest technologies to detect, thwart and mitigate attacks, while in progress as well as be prepared to mitigate after an attack.
An important driver in mitigating risk and increasing security is to ask the right questions. When evaluating cloud service providers, IT leaders need to ask: Read the full blog here.
Tags: 2014 annual security report, CIO, Cisco Security, Cisco Security Grand Challenge, CiscoCloud, CiscoSecurityGrandChallenge, cloud, cloud security, cloudtweaks, data security, Gartner, IoT, ITaaS, Network World, security, Service Provider