Cisco Blogs


Cisco Blog > Cloud

SUMMARY: Moving to the Cloud

Stay tuned for the next installments of our Moving to the Cloud series.

In the meantime, please add your comments or questions to the previous posts:

Seven Ways to Move to the Cloud

Seven Software Business Models – Part 1

Seven Software Business Models – Part 2

 

 

Tags: , , , ,

Cisco Cloud Security for Public and Private Cloud – A Secure, and Compliant Cloud Data Center

Recently the widespread fire of data breaches impacting privacy of millions of hapless people across the globe has become the stirring news. This spree of cyber attacks unveiling the fact that information security industry, organizations and even governments are vulnerable to today’s persistent, well-organized and sophisticated cyber threats.

There was a common theme among all the recent data breaches shown below and that is the amount of time for initial detection, which is in weeks and months.

Cisco Cloud Security

According to Verizon data breach report, 85% of cyber attacks Read More »

Tags: , , , , , , , , , , , , , , ,

RST Fiber’s High-speed Network powered by Cisco’s Evolved Programmable Network

ginaBy Gina Nienaber, Marketing Manager

We’ve been discussing the Evolved Programmable Network for some time now, knowing the transition from an IP NGN to an EPN is not something that will happen overnight (See EPN Blogs 1 , 2, 3). The Cisco® Evolved Programmable Network (EPN), represents an idea, an end-to-end unification of network, storage, and compute elements, and a lofty concept for existing multivendor networks to aspire to. New entrants into the communications industry are capitalizing on this period of evolution by building homogeneous end-to-end networks purpose built for SDN and NFV innovation.

One recent entrant is RST Fiber, based in North Carolina. Earlier in the year, Cisco and RST announced their 100 Gbps network deployment covering over 3000 miles throughout North Carolina with plans to Read More »

Tags: , , , , , , , , , , , ,

The Value of Endpoint and Network Protection Together

As I’ve discussed in past blog posts, advanced malware and sophisticated attacks are relentless as they compromise environments using new and stealthy techniques. Modern malware is dynamic and exists in an interconnected ecosystem that is constantly in motion. It will use an array of attack vectors, take endless form factors, and launch attacks over time.

In contrast, most security tools today are stuck in time – a point in time to be exact. They scan files once at the point of entry to determine if they are malicious, letting the supposedly “good” files in, and kicking the known “bad” files out. If the malicious file isn’t caught at point of entry, or if it evolves and becomes malicious AFTER entering the environment, point-in-time detection technologies give us little recourse after an infection occurs.

Read More »

Tags: , , , ,

Fresh Perspectives on Monetization in Programmable Service Provider Networks

bioShot-sWritten By Wayne Cullen, Senior Manager, Service Provider Architectures

Agility. Scalability. Automation. Orchestration. Programmability. Service providers are exploring such an array of new and exciting capabilities these days! You hear a lot about lowering costs by increasing efficiency and decreasing complexity.

But what about monetization? More specifically, do programmable networks help make you money while also saving it? What are the competitive benefits that lead to higher revenues from service agility and faster time-to-market? According to a 2013 Heavy Reading study, that’s a top expectation of service providers when asked about the potential benefits of software-defined networking (SDN). The Open Networking Foundation (ONF) has also promoted monetization opportunities based on SDN through new service creation and the enhancement of existing ones due to faster service creation, easier scalability, and mass customization.

Enhanced Revenue Generation with SDN-enabled Applications and Services Read More »

Tags: , , , , , , , , ,