In the past, a critical component of preventing threats was understanding and controlling network access and access to network resources based on role, while also denying access for unauthorized users and devices.
However, assuring this secure network access has been increasingly difficult due to:
- Complexity in understanding more than just who, but how, by what, when and from where users and devices attempt to access network resources
- Complexity in connecting authorized users to needed services with the explosion of both on premise and remote devices used by a single user
- Complexity in evolving network architectures where networks have become more “flat” and difficult to manage from a security standpoint
- Complexity in unifying the number of disparate security systems that need to be configured, managed and visualized
These various aspects of security complexity challenge security practitioners with delivering the right services and purchasing the right solutions to not just handle the complexity, but also reduce it. However, when we take a look at IT security spending, where does the majority of investment go and where do most vendors siphon their money to and why?
If you look across the entire attack continuum, there are three phases that people need to focus on when dealing with threats and attacks: before an attack happens, during the time it is in progress, and even after the damage is done. To properly protect against threats in all stages, organizations need to reinvestigate their security to gain visibility and control across these three phases in order to truly reduce risk.
Read More »
Tags: ISE, network access, security
In my previous Blogs I have talked about Megatrends including BYOD, the Next-Generation Workspace, Video and the Internet of Things. One unfortunate reality all of these trends have in common is that they are going to put additional stress on your current Network and Security Infrastructure and Operational Process.
TrustSec uniquely offers the welcome opportunity to improve and extend Security Policy Control and the same time make it easier to Operate and Maintain. This post concludes the mini-series on TrustSec. Previous Blogs have looked at TrustSec in the DC and applied to VDI. Here I have asked Dave Berry Cisco TSA to take a step back and look at the bigger picture from Network Access to the DC. Read More »
Tags: Cisco, Megatrends, network access, policy control, routers, SGT, TrustSec, vpn
How high does the price of gas have to go for you to start working from home, carpool, or take public transportation?
Gas prices in the San Francisco Bay Area have jumped above $4 per gallon. The AAA Daily Fuel Gauge Report shows national average prices around the $3.70 level. I take public transportation from time to time. When gas prices first hit the $4 mark back in mid 2008, I saw a dramatic jump in public transportation ridership. I remember passengers packed like sardines on buses and light rail trains during the commute hours, scenes that you would normally see on the streets of Beijing or Tokyo.
Is history simply repeating itself with $4 gas in 2008 and $4 gas today?
Read More »
Tags: $4 gas, Cisco Catalyst SmartOperations, MCOE, network access, PoE ports, Power over Ethernet, Smart Install, switch ports, wi-fi