Cisco Blogs

Cisco Blog > Security

Protecting the Video Headend and Data Center Infrastructure

George Tupy’s recent blog described how the growth of cloud and over the top (OTT) video presents a massive market opportunity for service providers to deliver video content anytime, anywhere, and on any screen. He also discussed how open IP networks and cloud-based delivery methods introduce new security vulnerabilities. To add fuel to the fire, content and customer data is often stored together inside the video headend and data centers making it more easily accessed by attackers. They can disrupt operations by launching denial of services (DoS) attacks, target your authorized users to gain access to your corporate network to steal, modify video content directly on your video headend, or even siphon out valuable customer and billing data. Theft of credit card numbers or customer identity information hurts your customers and damages your reputation in the industry.

Now the good news: Cisco has the security solutions to protect your video content and broadcast infrastructure so you can focus on developing premium content and services for your subscribers.

Imagine your video infrastructure protected by the leader in data center security. Envision multilayered solutions working together to ensure your content, services, and business are protected from advanced cyber threats – across the attack continuum – before, during and after an attack.

Cisco solutions address advanced threats



Our Next-Generation Firewalls use granular access control and identity checks. This strengthens your network perimeter and locks your video headend and data centers to defend before an attack happens.


When an attacker tries to compromise your business – through the network, web, or email – our integrated Next-Generation Intrusion Prevention System (NGIPS), Distributed Denial of Service (DDoS), and Web and Email Security Solutions engage threats as they happen.


If malware does manage to get in, Advanced Malware Protection (AMP), Network Behavioral Analysis, and sandboxing solutions have you covered.  These solutions continuously scan traffic and files to find threats before they become active. If malware does become active, we can isolate the threat and remediate the infection to bring you back online quickly.

Cisco brings a wealth of robust security solutions to provide comprehensive protection across your headend infrastructure and corporate IT systems. Security Services are also available to help you design, implement, and manage your security each step of the way and ensure you have the best protection across your business.

For more detailed product information, see Cisco’s Secure Data Center Solution. For a compelling deployment story, read how Cisco’s security solution was deployed to help fortress BT against growing cyber threats. You can also learn more on how Sky has chosen to implement Cisco’s comprehensive VideoGuard Everywhere software security solution for its next generation home entertainment system.

Tags: , , ,

Announcing OpenSOC .1

OpenSOC, an open source security analytics framework, helps organizations make big data part of their technical security strategy by providing a platform for the application of anomaly detection and incident forensics to the data loss problem. By integrating numerous elements of the Hadoop ecosystem such as Storm, Kafka, and Elasticsearch, OpenSOC provides a scalable platform incorporating capabilities such as full-packet capture indexing, storage, data enrichment, stream processing, batch processing, real-time search, and telemetry aggregation. It also provides a centralized platform to effectively enable security analysts to rapidly detect and respond to advanced security threats.

A few months ago we were really excited to bring OpenSOC to the open source community.  Developing OpenSOC has been a challenging, yet rewarding experience.  Our small team pushed the limits of what is possible to do with big data technologies and put a strong foundational framework together that the community can add to and enhance.  With OpenSOC we strive to provide an open alternative to proprietary and often expensive analytics tools and do so at the scale of big data. Read More »

Tags: , , , , , ,

IE Zero Day – Managed Services Protection

As of May 1, 2014, we can confirm Cisco customers have been targets of this attack. For the latest coverage information and additional details see our new post on the VRT blog.

Protecting company critical assets is a continuing challenge under normal threat conditions. The disclosure of zero-day exploits only makes the job of IT security engineers that much harder. When a new zero-day vulnerability was announced on April 26, 2014 for Microsoft Internet Explorer, corporate security organizations sprang into action assessing the potential risk and exposure, drafting remediation plans, and launching change packages to protect corporate assets.

Some companies however, rely on Managed Security Services to protect those same IT assets. As a Cisco Managed Security services customer, the action was taken to deploy updated IPS signatures to detect and protect the companies critical IT assets. In more detail, the IPS Signature team, as a member of the Microsoft Active Protections Program (MAPP), developed and released Cisco IPS signature 4256/0 in update S791 and Snort rules 30794 & 30803 were available in the ruleset dated 4-28-2014. The Cisco Managed Security team, including Managed Threat Defense, received the update as soon as it became available April 28th. Generally, Cisco Managed Security customers have new IPS signature packs applied during regularly scheduled maintenance windows. In the event of a zero-day, the managed security team reached out to customers proactively to advise them of the exploit and immediately were able to apply signature pack updates to detect and protect customer networks.

While corporate security organizations must still assess ongoing risks and direct overall remediations to protect corporate data, Cisco can take the actions to provide security visibility into the targeted attacks, increase protection with fresh signatures, and reduce risk profile for the corporate InfoSec program.

For more detail on the vulnerability, please see Martin Lee’s blog post.

More details about this exploit and mitigation information can be found on the following links:

For additional information about Cisco Managed Security solutions please refer to the following links and contact your Cisco Services sales representative:

Tags: , , , , , , , , ,