Cisco Blogs


Cisco Blog > Security

Big Data in Security – Part III: Graph Analytics

TRACFollowing part two of our Big Data in Security series on University of California, Berkeley’s AMPLab stack, I caught up with talented data scientists Michael Howe and Preetham Raghunanda to discuss their exciting graph analytics work.

Where did graph databases originate and what problems are they trying to solve?

Michael: Disparate data types have a lot of connections between them and not just the types of connections that have been well represented in relational databases. The actual graph database technology is fairly nascent, really becoming prominent in the last decade. It’s been driven by the cheaper costs of storage and computational capacity and especially the rise of Big Data.

There have been a number of players driving development in this market, specifically research communities and businesses like Google, Facebook, and Twitter. These organizations are looking at large volumes of data with lots of inter-related attributes from multiple sources. They need to be able to view their data in a much cleaner fashion so that the people analyzing it don’t need to have in-depth knowledge of the storage technology or every particular aspect of the data. There are a number of open source and proprietary graph database solutions to address these growing needs and the field continues to grow.

Graph Read More »

Tags: , , , , , , , , , , , , ,

Big Data in Security – Part I: TRAC Tools

TRACRecently I had an opportunity to sit down with the talented data scientists from Cisco’s Threat Research, Analysis, and Communications (TRAC) team to discuss Big Data security challenges, tools and methodologies. The following is part one of five in this series where Jisheng Wang, John Conley, and Preetham Raghunanda share how TRAC is tackling Big Data.

Given the hype surrounding “Big Data,” what does that term actually mean?

John:  First of all, because of overuse, the “Big Data” term has become almost meaningless. For us and for SIO (Security Intelligence and Operations) it means a combination of infrastructure, tools, and data sources all coming together to make it possible to have unified repositories of data that can address problems that we never thought we could solve before. It really means taking advantage of new technologies, tools, and new ways of thinking about problems.

Big Data

Read More »

Tags: , , , , , , , , , , , , , , , , , , ,

A Chapter from My Unwritten Book: Social Media Planning (Part 2)

September 24, 2013 at 10:01 am PST

Last week, I shared basic enablement, intelligence, engagement and measurement practices. This week’s presentation focuses on some advanced practices in the areas of intelligence, engagement, advocacy and measurement. By no means is this list complete so please feel free to add your two cents in the Comment box below. The more we share, the more we can influence how companies and even industries are viewing and adopting social media. Collectively, we can shape its evolution. So please, share away!

And without further ado, here’s another chapter from my unwritten book in slide deck format:   Read More »

Tags: , , , , , , , , , , , , , ,

How Secure is Your Secure Access?

July 30, 2013 at 8:04 am PST

In June, I attended the Gartner Security Summit in Washington, D.C. where I was asked by quite a few security executives, “My network folks just bought ISE, but what is ISE and what type of security does it provide?”  Fast forward to July, and I wish I had this SANS review on ISE to offer a month earlier.  (SANS, as many security professionals know, is a highly regarded organization on IT security and cyber security.) Read More »

Tags: , , , , , , , , , , ,

Adaptive Radio Modules for the 3600 Series AP: Best of Interop 2013 Finalist

We’ve been really busy but also very thrilled about the work we’re doing to future-proofing the network, and it seems we’re not alone. One of our latest innovations, adaptive radio modules for the AP3600, has been selected by UBM as a Best of Interop finalist for the Wireless award category!

Best of Interop Finalist

It’s an honor to be recognized for our innovation and technological advancements in wireless, and we wanted to share a bit more about our submission with you.

What are the Adaptive Radio Modules?

The Adaptive Radio Modules a family of solutions in a modular form factor that allows customers to adapt their wireless network to their current and future needs. The Adaptive Radio Modules provide a dedicated third radio that can be field upgraded on the 3600 Access Point.

Cisco offers three adaptive radio modules for the 3600 Access Point:

Read More »

Tags: , , , , , , , , , , , , , , , , , , , , , , ,