Cisco Blogs


Cisco Blog > Security

Data Security Through the Cloud [summary]

Is the combination of cloud computing and mobility a perfect storm of security threats?

Actually, yes. And you should prepare for them as if there is a storm coming.

As businesses become increasingly mobile, so does sensitive data. In fact, in a recent survey conducted by ESG,

31% of security professionals say that the biggest risk associated with cloud infrastructure services is, “privacy concerns associated with sensitive and/or regulated data stored and/or processed by a cloud infrastructure provider.”

Data Security Through the Cloud

 

With cloud-based services, it is key to have visibility into applications and provide consistent experience across devices accessing the web and cloud applications. More users are leaving the standard PC behind and engaging cloud applications through a mobile device, making application-layer security and user access security critical. Smartphones and tablets are able to connect to applications running anywhere, including public, private and hybrid cloud applications, opening your data to potential attacks. Security professionals need assurances that their cloud security provider will appropriately secure customer data while ensuring availability and uptime.

 

The conversation is no longer if you’ll be attacked, but when. And will you be prepared?

Read the full article: Data Security Through the Cloud

Tags: , , , , , , , , , , , ,

Data Security Through the Cloud

Is the combination of cloud computing and mobility a perfect storm of security threats?

Actually, yes. And you should prepare for them as if there is a storm coming. As businesses become increasingly mobile, so does sensitive data. In fact, in a recent survey conducted by ESG,

31% of security professionals say that the biggest risk associated with cloud infrastructure services is, “privacy concerns associated with sensitive and/or regulated data stored and/or processed by a cloud infrastructure provider.”

Data Security Through the CloudDid you know:

16 billion web requests are inspected every day through Cisco Cloud Web Security

93 billion emails are inspected every day by Cisco’s hosted email solution

 200,000 IP addresses are evaluated daily

400,000 malware samples are evaluated daily

33 million endpoint files are evaluated every day by FireAMP

28 million network connects are evaluated every day by FireAMP

Read More »

Tags: , , , , , , , , , , , ,

CIO or IT Services Broker?

In the heart of the overall shift from cloud computing as an isolated project to a central IT strategy, a particular tenet is reigning supreme: hybrid IT strategies. As cloud computing continues to evolve, new technologies are emerging to support the dynamic creation of cloud services. CIOs are increasingly feeling the need to deal with hybrid environments.  But how? Enter the rise of hybrid IT process models and the positioning of IT as a service broker.

Gartner recently identified hybrid cloud and IT as a Service broker (ITaaSB) in its Top 10 Strategic Technology Trends; they also highlighted how to move to an ITaaSB environment in their research titled: Top 10 Technology Trends, 2013: Cloud Computing and Hybrid IT Drive Future IT Models.

 
ITServiceBroker

But what exactly is an IT services broker? And how can we help make this shift?

Read More »

Tags: , , , ,

The Cisco IT Story: ITaaS with Cisco Prime Service Catalog

We had some exciting sessions featuring Cisco Prime Service Catalog at Cisco Live Milan a few weeks ago. In case you missed it, we featured two great customer case studies.

One of them was Steria, a multinational service provider headquartered in France who has deployed Cisco Prime Service Catalog and FlexPod for their cloud services and innovative Bring-Your-Own-Device (BYOD) solution: “Workplace on Command.” You can click here to download their Cisco Live presentation, and check out their written case study here.

The other customer we featured was a Fortune 100 enterprise: none other than our very own Cisco IT.  The Cisco Live presentation about their internal IT service catalog deployment (dubbed “eStore”) is here – you can also read a detailed case study write-up here.

estore1

[Screenshot of eStore: the Cisco IT deployment of Cisco Prime Service Catalog]

Adel du Toit, who heads the Cisco eStore project, wrote a blog post about Cisco IT’s initiative here last June.  Led by Adel and her colleageues, the internal Cisco IT eStore has been rapidly evolving, and has been deployed for a variety of use cases, including BYOD, mobile apps, collaboration, communications, desktop services, employee onboarding, networking, data center computing, and much more.  Powered by Cisco Prime Service Catalog together with Cisco Process Orchestrator for automated service provisioning, the eStore is the “one stop shop” for all IT services within Cisco.

estore2

[Cisco IT’s eStore: a unified IT service catalog for all internal tools, apps, and services]

Recently, the eStore upgraded to the latest version of Cisco Prime Service Catalog, version 10.0. The eStore has also rolled out a mobile user interface that allows Cisco employees to download mobile apps to increase productivity and reduce unproductive approval cycles.

estore3

[The Cisco IT eStore mobile version]

 This has enabled Cisco IT to provide a consumer-oriented shopping experience for IT services to all our employees, not unlike their experience as consumers with Amazon.com and the Apple App Store.

Interested in learning more? Join us on February 26th at 11 am EST / 8 am PST to learn more about how Cisco IT is automating IT-as-a-Service via the eStore and Cisco Prime Service Catalog. You can register here: http://cs.co/6014eN9j.

And don’t forget to follow @CiscoUM and @CiscoIT for the latest updates.

Tags: , , , , , , , , , , ,

IT – The rapid pace of changes we can expect in 2014

January 27, 2014 at 9:20 am PST

We are almost at the end of January in 2014 and Cisco Live is underway in Europe.   The IT landscape is changing rapidly, and we all need to adapt to it.  In a previous blog I had listed some of the high priority issues for IT in 2014, and in this blog I will emphasize the rate of change needed to keep pace.

Cyber threats are growing in all forms and shapes.

From retail giants like Target to local school districts, all have been targets of attacks last year. This 2014 Cisco security report is an eye opener.  The use of cloud computing and mobile devices is only increasing the complexity of security. Vulnerabilities are increasing because data centers have thus far adopted “bolt on” security measures i.e disparate technologies with multiple control points that were never meant to work together. Malicious actors are working faster to exploit gaps. IT must adapt quickly to this new normal.

IT must now deliver services not technology

Business expects IT to deliver consistent high quality services.  Projects will not be one off, siloed, custom solutions.  This is akin to moving away from a job shop model to a highly industrialized continuous flow model in the world of manufacturing. Projects will get more complex due to the use of shared resources and the resulting interrelationships. All this calls for a high degree of automation and service assurance mechanisms, resulting in more changes to the IT department. At Cisco, we are working hard to provide IT the necessary tools to adapt to these changes. UCS Manager is still the gold standard in automating converged infrastructure setup and maintenance.  This is made possible with the service profile innovation shown in the video below.  To find out more about UCS Manager attend this meetup in Santa Clara on the 27th of Feb.

Read More »

Tags: , , ,