Cisco Blogs


Cisco Blog > SP360: Service Provider

Point of View: Optimisation, Monetisation and Customer Privacy

PJ PhotoGuest blog from Paul Jesemann, Cisco Solution Consultant, Mobile Architecture, APJ

In June, a mobile operator in India was accused of spying on its customers by inserting a javascript in browsing sessions on its 3G network. The service provider admitted it was using a solution to help customers keep track of data usage, yet in press and blogs, concerns were expressed about it being a privacy breach, and a means to track subscriber browsing data for monetisation purposes.

Instead of unnecessarily debating the incident as such, maybe a Read More »

Tags: , , , , , , , , ,

SUMMARY: Moving to the Cloud

Stay tuned for the next installments of our Moving to the Cloud series.

In the meantime, please add your comments or questions to the previous posts:

Seven Ways to Move to the Cloud

Seven Software Business Models – Part 1

Seven Software Business Models – Part 2

 

 

Tags: , , , ,

Cisco Cloud Security for Public and Private Cloud – A Secure, and Compliant Cloud Data Center

Recently the widespread fire of data breaches impacting privacy of millions of hapless people across the globe has become the stirring news. This spree of cyber attacks unveiling the fact that information security industry, organizations and even governments are vulnerable to today’s persistent, well-organized and sophisticated cyber threats.

There was a common theme among all the recent data breaches shown below and that is the amount of time for initial detection, which is in weeks and months.

Cisco Cloud Security

According to Verizon data breach report, 85% of cyber attacks Read More »

Tags: , , , , , , , , , , , , , , ,

RST Fiber’s High-speed Network powered by Cisco’s Evolved Programmable Network

ginaBy Gina Nienaber, Marketing Manager

We’ve been discussing the Evolved Programmable Network for some time now, knowing the transition from an IP NGN to an EPN is not something that will happen overnight (See EPN Blogs 1 , 2, 3). The Cisco® Evolved Programmable Network (EPN), represents an idea, an end-to-end unification of network, storage, and compute elements, and a lofty concept for existing multivendor networks to aspire to. New entrants into the communications industry are capitalizing on this period of evolution by building homogeneous end-to-end networks purpose built for SDN and NFV innovation.

One recent entrant is RST Fiber, based in North Carolina. Earlier in the year, Cisco and RST announced their 100 Gbps network deployment covering over 3000 miles throughout North Carolina with plans to Read More »

Tags: , , , , , , , , , , , ,

The Value of Endpoint and Network Protection Together

As I’ve discussed in past blog posts, advanced malware and sophisticated attacks are relentless as they compromise environments using new and stealthy techniques. Modern malware is dynamic and exists in an interconnected ecosystem that is constantly in motion. It will use an array of attack vectors, take endless form factors, and launch attacks over time.

In contrast, most security tools today are stuck in time – a point in time to be exact. They scan files once at the point of entry to determine if they are malicious, letting the supposedly “good” files in, and kicking the known “bad” files out. If the malicious file isn’t caught at point of entry, or if it evolves and becomes malicious AFTER entering the environment, point-in-time detection technologies give us little recourse after an infection occurs.

Read More »

Tags: , , , ,