Cisco Blogs


Cisco Blog > Enterprise Networks

Shining a New Light on Shadow IT

More people than ever are talking about “shadow IT” nowadays.  As the name implies, it’s mysterious, perhaps even malevolent by some people’s standards.  From a traditional IT vantage point, this negative view may be somewhat justified given the risks it creates around security, compliance, productivity, and technology investment.

But let’s look at it from another perspective. Shadow IT is on the rise because more people outside of IT are gaining awareness and access to technology, and harnessing it as a business differentiator. More importantly, many of these people are business leaders with growing budgets that align to their priorities. Here’s how much technology budget growth business leaders expect in the next year:

(read more)

Over the next year how will your group’s technology budget change 

Source: Cisco Business and IT Priority Survey results Read More »

Tags: , , , , , , ,

Building Bridges for the Future of Technology

Technology in the public sector has revolutionized the way government agencies deliver services, conduct operations and secure sensitive information. Last week, I had the pleasure of learning from several prominent government leaders about how smart, visionary leaders have harnessed the power of new technology to transform the way they fulfill their respective missions.

We started by visiting the National Cybersecurity Center of Excellence (NCCoE) in Rockville, Maryland, which is part of the National Institute of Standards and Technology (NIST). When complete later in summer 2015 the NCCoE facility will be the epicenter of cybersecurity education, strategy and technology for government, academia and private industry and corporations such as Cisco. Now more than ever, such public-private partnerships are imperative in recognizing and thwarting common enemies who can wreak havoc by compromising sensitive information. This center will allow the top thinkers, practitioners, IT professionals and educators to collaborate and develop strategies to keep our sensitive information protected. Donna Dodson, director of the Center, hopes it will evolve into a hub for cyber solutions derived from government and private-sector tools. Read More »

Tags: , , , , , ,

Beyond Security Concerns: IoT Also Provides Security Benefits!

March 17, 2014 at 5:00 am PST

The Internet of Things (IoT) is a topic that’s beginning to gain quite a head of steam lately, particularly when it comes to security concerns that accompany it. Billions of new devices, most of which are in insecure locations. You don’t own them; oftentimes can’t see them; and you don’t control them in any way, shape, or form. Yet they’re sending petabytes of data through your network. It’s enough to make a security professional lose sleep for weeks at a time.

But while many security professionals are focusing on these challenges, there’s also a huge security benefit that will come in the form of IoT enabled security! Remember, IoT isn’t about the devices themselves, it’s about the network of devices – the benefits from having all of those devices work together to produce actionable intelligence. In a similar vein, securing IoT networks can’t be about the individual security devices, but rather the network of security devices, so that they can work together to produce comprehensive, actionable security intelligence in near real-time – increasing the organization’s overall security posture with little or no human intervention required.

Read More »

Tags: , , , , , , ,

From the Mine Shaft to the Store Shelf — an IoE Revolution in Manufacturing

Since Henry Ford, the alchemy of turning raw materials into mass-produced products has been complicated and challenging. At best, it has been a delicate and precarious balancing act; at worst, something akin to herding cats.

The trick has always been to align ever-shifting patterns of customer demand with far-flung ecosystems of miners, designers, suppliers, engineers, factory workers, truck drivers, sellers, and so forth. Yet the process of orchestrating such intricate value chains has often been based on art (hunches) more than science (data).

Today, however, the Internet of Everything (IoE) — the ongoing explosion in networked connectivity among people, process, data, and things — is transforming manufacturing in startling ways, just as it is changing so many other industries.

IoE delivers seamless, intelligent connections to every corner of the manufacturing value chain, optimizing the flow of products, information, and payments in real time.

The Cisco IoE Value Index study found that in 2013, manufacturing had the largest potential share of IoE Value at Stake, at $224 billion. Yet, it was poised to realize only 46 percent of that potential bottom-line value.  The key to closing that gap lies in much-improved machine-to-machine and machine-to-people connections, resulting in smart factories, smart grids, and connected supply chains, among many other IoE-related innovations.

Read More »

Tags: , , , , , , , , , , , ,

Summary: Announcing The Cisco IoT Security Grand Challenge

March 12, 2014 at 4:51 pm PST

Despite its overwhelming business benefits, the Internet of Things (IoT) also significantly increases security risks.  That’s why Cisco is pleased to announce the IoT Security Grand Challenge, an industry-wide initiative to bring the global security community together to secure the IoT, and deliver intelligent cybersecurity for the real world – before, during, and after an attack. Winners will be awarded $50,000 in prize money and be publicly announced at the IoT World Forum this Fall!

Read the full Fame and Fortune Awaits: The Cisco IoT Security Grand Challenge blog post to learn more.

Tags: , , , , , , ,