Cisco Blogs

Cisco Blog > Security

Active Threat Analytics: Easing the Burden of Threat Management

In Greek mythology, Sisyphus was a trickster king cursed with the eternal torment of fruitless labor. As punishment for his hubris and wile, Zeus condemned this hapless figure to the unending task of pushing a boulder up a mountain. Once he reached the top, the boulder would fall back down. And he would begin again. And again. Every day. Forever.

I suspect that it will not be a great imaginative leap for those of you in the in the information security industry to empathize with this unfortunate soul. Cyberattacks are continuously growing in frequency and sophistication. Threats are ever-present. New technologies and changing business models are always forcing you to change your tactics. Protecting your organization’s sensitive information seems like a Sisyphean undertaking: constant and unceasing.

I hear this from our customers all the time. IT security feels like an uphill battle, and the struggle to guard against ever-evolving threats seems interminable. As innovative social, mobile, analytics, cloud, robotics, and Internet of Everything (IoE) technologies transform every organization into a digital organization, the prospect of maintaining a strong security posture amid such rapid and widespread change can be daunting. We hear you, we get it, and we are ready to help. Just as Cisco is helping organizations become digital, we are also deeply committed to ensuring that security is the bedrock upon which the successful digital enterprises of the future will stand. For that to happen, organizations will need security solutions designed for the world of tomorrow. To help organizations transform securely, we have created Cisco Active Threat Analytics – a suite of next-generation managed security services that will help customers to detect threats in their environments with great speed, accuracy, and focus.

Read More »

Tags: , , , , , , , , , ,

Keep The P.A.C.E.


  In the military, we have a phrase:  “Shoot, Move, and Communicate”.   However, it should really be “Communicate, Move, then Shoot”… because you can’t do either two without communicating first.  However, I’m sure the first adage just sounds cooler… What’s that mean? In any great organization, one of the essential components of any plan is, “How are we going to talk to each other”, whether that be by a simple phone on the desk or a hi-tech secure data/voice/video capability.  In order to have proper Command and Control (C2) over the battlefield and mass, organize, and develop precision maneuver, a plan has to be created that’s efficient, effective, and reliable… most importantly, it has to be REDUNDANT! Read More »

Tags: , ,