Guest blog from Paul Jesemann, Cisco Solution Consultant, Mobile Architecture, APJ
Instead of unnecessarily debating the incident as such, maybe a Read More »
Tags: Cisco, customer privacy, data usage, monetization, Networks, optimization, privacy, service providers, subscriber data, user experience
Stay tuned for the next installments of our Moving to the Cloud series.
In the meantime, please add your comments or questions to the previous posts:
Seven Ways to Move to the Cloud
Seven Software Business Models – Part 1
Seven Software Business Models – Part 2
Tags: business models, cloud, IT, Networks, software
Recently the widespread fire of data breaches impacting privacy of millions of hapless people across the globe has become the stirring news. This spree of cyber attacks unveiling the fact that information security industry, organizations and even governments are vulnerable to today’s persistent, well-organized and sophisticated cyber threats.
There was a common theme among all the recent data breaches shown below and that is the amount of time for initial detection, which is in weeks and months.
According to Verizon data breach report, 85% of cyber attacks Read More »
Tags: Cisco Cloud Security, cloud data center, compliance, Cyber Attacks, cyber threat management, data breach, FISMA, HIPAA, Networks, next-generation, pci, privacy, SecureState, security breaches, security model, service providers
By Gina Nienaber, Marketing Manager
We’ve been discussing the Evolved Programmable Network for some time now, knowing the transition from an IP NGN to an EPN is not something that will happen overnight (See EPN Blogs 1 , 2, 3). The Cisco® Evolved Programmable Network (EPN), represents an idea, an end-to-end unification of network, storage, and compute elements, and a lofty concept for existing multivendor networks to aspire to. New entrants into the communications industry are capitalizing on this period of evolution by building homogeneous end-to-end networks purpose built for SDN and NFV innovation.
One recent entrant is RST Fiber, based in North Carolina. Earlier in the year, Cisco and RST announced their 100 Gbps network deployment covering over 3000 miles throughout North Carolina with plans to Read More »
Tags: 100G, ASR9000, broadband, Cisco EPN, connectivity, high-speed, IPv6, Networks, NFV, programmable networks, RST Fiber, SDN, wireless
As I’ve discussed in past blog posts, advanced malware and sophisticated attacks are relentless as they compromise environments using new and stealthy techniques. Modern malware is dynamic and exists in an interconnected ecosystem that is constantly in motion. It will use an array of attack vectors, take endless form factors, and launch attacks over time.
In contrast, most security tools today are stuck in time – a point in time to be exact. They scan files once at the point of entry to determine if they are malicious, letting the supposedly “good” files in, and kicking the known “bad” files out. If the malicious file isn’t caught at point of entry, or if it evolves and becomes malicious AFTER entering the environment, point-in-time detection technologies give us little recourse after an infection occurs.
Read More »
Tags: AMP, Cisco Advanced Malware Protection, malware, Networks, security