Cisco Blogs


Cisco Blog > The Platform

Cisco Bolsters Security Strategy with Agreement to Acquire Sourcefire

Today’s threat landscape is more dynamic than ever before. Rapid changes in the world around us, driven by cloud, mobility and the Internet of Everything, are considerably affecting traditional security approaches. The notion of the “perimeter” no longer exists and threats are able to circumvent traditional, disparate security products.

The marketplace needs a pervasive, continuous security architecture that addresses each phase of the attack lifecycle. Today, we are excited to announce the acquisition of Sourcefire (NASDAQ: FIRE), which directly supports Cisco’s strategy to constantly defend, discover and remediate threats – with the ultimate goal of covering our customers before, during and after an attack.

Sourcefire, based in Columbia, MD, is a leader in intelligent cybersecurity solutions. Sourcefire delivers effective, highly automated security through continuous threat research, detection and protection across its portfolio of next-generation intrusion prevention systems (IPS), next-generation firewall, and advanced malware protection solutions.

Sourcefire couples its technology with automated, real-time visibility across the extended network that includes virtual, mobile and endpoints. These solutions work not only at a point-in-time, but also provide continuous threat protection and retrospective remediation across the network.

Having led security innovation for more than 12 years, Sourcefire has assembled a world-class team with deep security DNA that will help drive Cisco’s execution of its security strategy. Sourcefire was founded by Marty Roesch, who pioneered their success through open source, creating a community of security technologists working together to build an industry leading intrusion prevention system. Sourcefire also is home to the Vulnerability Research Team, a group of elite security experts who work around the clock to proactively discover, assess, and respond to the latest trends in hacking activities, intrusion attempts, malware and vulnerabilities.

Sourcefire’s open source model is expected to strengthen and accelerate Cisco’s ability to build a strong ecosystem of security partners who can bring real time threat intelligence and innovations to customers through integration with our technologies and platforms.

Security is a critical component to Cisco’s overall strategy to be the No. 1 IT company.  Earlier this year, we acquired Cognitive Security, a security software company that applies artificial intelligence techniques to detect advanced cyber threats. Cognitive Security and Sourcefire are expected to help Cisco achieve our goal as we offer more best-in-class security services; more intelligence sources for continuous protection; and an open platform to enable a threat-aware network.

We believe that Cisco and Sourcefire customers will benefit from the combination of world-class products and technologies to provide continuous and pervasive advanced threat protection across the entire attack continuum and from any device to any cloud.

I am delighted to welcome the entire Sourcefire team to the Cisco family, and look forward to a prosperous future together.

In closing, I would simply like to remind you that this blog contains forward-looking statements which are subject to risks and uncertainties, including the risk factors discussed in Cisco’s most recent reports on Form 10-K and Form 10-Q filed with the SEC on September 12, 2012 and May 21, 2013, respectively, and in the press release announcing this transaction.  Such risks could cause actual results to differ from those contained in the forward-looking statements.  For further information, please consult such Form 10-K, Form 10-Q, and Cisco’s Form 8-K covering such press release, each available free of charge at the SEC’s website at www.sec.gov or by going to Cisco’s Investor Relations website at http://www.cisco.com/go/investors.

 

Tags: , , , , , ,

Ask The Internet of Everything Futurist: “When Will We Get Our Flying Cars?”

Flying cars. Robots. Biometric devices. These are just some of the things I get to think about and research in my role as Cisco’s Chief Futurist. As the Internet of Everything continues to connect more people, process, data, and things it is exciting to think about the possibilities.

Looking at life 50 years ago can give us perspective about just how far we have come. In 1963, push-button telephones were first introduced and the world’s population was 3.2 billion, less than half of what it is today. The next 50 years will be just as revolutionary and life changing, perhaps even more so.

Read More »

Tags: , , , , , , , , ,

Higher Education Races Towards 802.11ac

[Webinar] 802.11ac in Higher Education | Wednesday July 24 at 3pm PST < REGISTER

It’s no secret that mobile devices are playing a larger part in today’s businesses. With the fast pace of mobility adoption by consumers, network usage has started to outrun the infrastructure of most enterprises’ mobile networks. Enterprise IT managers are struggling to keep up with mobility’s effects on workplace productivity and requirements.

Among the growing trends that weigh heavily on the minds of most network IT professionals is bring your own device (BYOD). The growth of bandwidth-intensive applications, like video streaming, and the user expectations of always-on network and application performance also place heavy demand on organizational infrastructure.

802.11ac is the next generation of Wi-Fi, designed to give enterprises the tools to meet the demands of BYOD, high-bandwidth applications, and the always-on connected user. This Wednesday we will be hosting a workshop to discuss the benefits of 802.11ac, and how to optimize it for high density and high bandwidth to benefit higher education. Students, typically early adopters of wireless technology, usually bring 802.11ac in the form of the latest laptop, smartphone, and tablet that support this new technology. Read More »

Tags: , , , , , , , , , , , , , , , , , ,

Unlocking the Value of Data in Motion Through Analytics

Kiran-Mattyola-mabadejeWritten By Kiran Matty, Marketing Manager, and Ola Mabadeje, Marketing Manager

If “Big Data” is crude oil, then Analytics is its refinery. According to a Cisco IBSG report, “if ‘crude” data can be extracted, refined, and piped to where it can impact decisions, its value will soar”. The trends, patterns, and insights that can be gathered from the various sources of Big Data are virtually limitless. However, this blog shall primarily focus on the analytics that can be generated by refining i.e. analyzing the data that’s resident in a mobile network and is largely untapped.

According to Cisco VNI, the number of connected devices will be three times the global population by 2017 and the global IP traffic will also increase threefold in the same time frame. Mobile Networks have not only been primed to sustain this onslaught but have also transformed into a programmable platform that can collect, correlate, and contextualize data rapidly. Network data, Policy, and Analytics interplay in a multitude of ways and form the basis of Data in Motion that’s at the heart of network monetization.

Hidden opportunities exist in the market gaps

As you might be aware, CPM (Cost per Mille) for mobile Ads is lower than that of other advertising media such as online, television, etc. This is because mobile Ads are generally untargeted, which leads to ineffective Ad campaigns, and could be attributed to a large extent to the lack of contextual awareness vis-à-vis location, demographics, browsing history, network conditions, screen size, etc. Although market researchers have perfected the measurements for other advertising media, they haven’t yet cracked the nut for mobile and the mobile metrics remain fuzzy at best which is impeding the flow of advertising dollars to mobile. On the other hand, as much as we love applications like Apple Siri and FaceTime, Angry Birds, etc., and devices like the Apple iPhone, they have turned out to be an operational nightmare in certain cases for the mobile operators around the world because of the data and signaling Tsunami that they can potentially bring about. This is due in part to lack of network analytics that can predict such surges in the network traffic with reasonable accuracy to allow for timely management of the network in terms of network capacity and bandwidth. This would eventually lead to operational efficiency and hence cost savings. Further, think about Internet of Everything and the 50 billion devices that would come online by 2020!

Mobile network operators are well positioned to address the above pain-points. With access to millions of subscribers, they can predict network and consumer behavior with high degree of accuracy quite simply because of the law of large numbers. Unlike many pure-play analytics vendors, network operators have direct access to data from a variety of sources such as CDN (Content Delivery Network), devices, applications, network billing and charging systems, not to mention the various mobile network elements. Some may even have access to subscriber Wi-Fi data. Lastly, many have the cloud infrastructure that’s needed for analyzing data at a bigger scale.

Translating opportunities to $$$ Read More »

Tags: , , ,

[Cartoon Catalyst Blog Series] K-12 BYOD. Secure Students, Determine Internet Access, and Yet Provide Awesome Network Performance?

Students bounding into schools touting the latest device is creating big problem for K-12 IT departments. How can schools support BYOD initiatives while securing these mobile devices and the student information embedded within them if IT staff numbers aren’t growing?

In his latest blog, K-12 BYOD. Secure Students, Determine Internet Access, and Yet Provide Awesome Network Performance?, Cisco’s Rahul Chohan discusses how Identity Services Engine policy deployment as a part of Cisco BYOD Solutions for K12 Education helps simplify mobile device security streamlines the IT security processes required to deploy BYOD. Rahul’s blog covers how ISE helps protect minors, ensure performance, and simplify IT over the wired and wireless infrastructure. How exactly can it do this? You’ll have to read his blog to find out.

For more on Cisco BYOD Solutions for K12 Education page.

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,