Cisco Blogs


Cisco Blog > Security

Getting to Know Tom Powledge, Vice President of Cisco Managed Security Services

After several months leading the managed security services portfolio at Cisco, I sat down with the social media team to discuss my path to Cisco, the evolution of the security market, and the future of security. [Note: This is an abridged version of the full interview.]

Q: After nearly 20 years at Symantec, why did you decide to move to Cisco?

TP: Cisco has all of the pieces necessary to solve the biggest security problems facing businesses today and into the future. Cisco’s position in the network, its broad security product portfolio, its strong and continued investment in security, and its pivot toward driving business outcomes and solving customer problems place this company in a unique position to lead the charge toward the next generation of security. As a part of a company that builds the cloud, mobility, collaboration, and Internet of Everything technologies driving change in the security market, we have a unique opportunity to proactively build security services that enable the secure adoption of these innovations. Our ability to integrate with networking technologies and all types of connected devices allows us to feed huge amounts of data from across an entire customer network into our big data platform for detecting, investigating, and analyzing threats. I’m eager to take what I’ve learned throughout 19 years in security and put that knowledge and experience to work in building up Cisco’s resources into a next-level suite of solutions. Read More »

Tags: , , , , , ,

Quick Tips for Tracking Alerts

It’s no secret, networks, in general, are more challenging to manage than before.

As networks increase in complexity to embrace new business innovations, they may require more supporting devices, which, in turn, can result in even more alerts to manage.

If you’re a network manager or security officer, what are you going to do?

At Quintiles, they started using Smart Net Total Care to identify devices that might have security vulnerabilities. In the centralized portal, their IT team could easily access information on each type of alert, which is displayed by category or device and contains summary information with a link to the actual alert on Cisco.com.

“In the past, our security team would receive a notification and need detailed data from us to determine our level of risk,” says Wil Bolton, senior network systems engineer for Quintiles. “Now we can be proactive, because we can check the portal and know immediately. We have already completed some critical upgrades based on PSIRT information and can be confident that we are aware of a potential vulnerability.”

So, how are you going to quickly identify risks and network vulnerabilities? How will you reduce time chasing irrelevant alerts, so you have more time to focus on projects you care about?  Read More »

Tags: , , ,

Radware and Cisco Sign OEM Agreement As DDoS Mitigation Becomes a SP Imperative

DDoS attacks are no longer just a nuisance and they can cause lasting damage. Organizations that ignore this threat often learn the high costs involved in the damage from these attacks – ranging from mild service degradation and to extended service outage. According to Aberdeen Group research, the cost of a one second delay in website load time can translate to a 7% reduction in conversion rate and up to $2.5 million in losses per year. The cost of outage? That can reach nearly half a million dollars per hour.

Attacks have evolved in multiple dimensions: Read More »

Tags: , , , , ,

Defeat IT Complexity To Free Time For Innovation

When Apple Pay was announced in September this year, it brought a lot of attention to the digital payment business. But this is certainly not the first sign that we are moving rapidly towards a digital society. For example, Starbucks has been doing this for years by handling millions of mobile wallet payments every week. In fact, they took 90% of the $1.3 billion mobile payment market last year. So, what is their secret sauce of success? Their CEO boils it down to:

  • Mobile payments convenience, and
  • Automatic loyalty rewards

The opposite of convenience and automation is complexity. Cisco is hosting a live “Defeat IT Complexity” webcast on Tuesday December 10, 2014, to help you to achieve outstanding results with innovation and simplification.

Read More »

Tags: , , , , , , , , ,

Three Deciding Factors To Reach A New Digital World

In a Technology Vision 2014 report, consulting firm Accenture discussed major trends that drive a dramatic transformation for every business to enter a digital world. As they described, the excitement is to change from being “digitally disrupted” today to “digital disrupters” tomorrow. The huge opportunity is for businesses position themselves as leaders in this new world.

Many forces are at work in the journey of this remarkable transition. Among them, three dominant factors will play a vital role to determine whether this digital transformation will be successful: an intelligent information edge, IT simplicity and cybersecurity.

dino pic 1 blog

At the edge of the new digital world, intelligent and real-time technologies allow people to act and react faster to achievebetter experience and outcome. While mobile device explosion serves as a clear indicator of this rapid transition, greater potential lies ahead to fully utilize the power of mobility, analytics, cloud computing and other new technologies. For a preview of what is possible, check out how Fernbank Natural History Museum integrates 3G/4G and Wi-Fi seamlessly. The outcome is an dynamic application that brings an immersive and interactive experience to the visitors, instead of forcing them to find the information.

Technical complexity arises, as more and more applications, systems and infrastructure are added together over time.  Cisco Global IT Impact Survey in 2013 found that nearly three out of four IT participants (71 percent) were deploying more applications than a year ago. Without IT simplicity, IT departments will be rapidly consumed by day-to-day fire drills. They will lose their ability to innovate and their relevance to the business.

Read More »

Tags: , , , , , , ,