The other day I took my one year old son on his first train ride. I knew that he would enjoy the short trip (just a couple of stops and back) and I wanted him to get the feeling of riding a train. While on the train I noticed a teenager text messaging on a phone.
I smiled to myself, thinking that here’s a teenager holding a Smartphone in hand on a train with a modern Wi-Fi enabled network with 3G coverage, and yet she’s still communicating via a 30 year old technology.
The Global Certification Team is pleased to announce thati the 5940 Embedded Services Router (ESR) has been awarded Common Criteria certification. The 5940 ESR is certified at EAL2+ against the Traffic Filter Firewall in Basic Robustness Environments v1.1. The Cisco 5940 ESR validated for IOS Version: 15.1(2)GC1.
While 2012 will be the Year of the Dragon, according to the Chinese zodiac, in IT 2012 will be the year of the cloud. And not just one big cloud, but many clouds.
This world of many clouds means numerous opportunities for Cisco partners to offer customers, whether it’s building clouds, selling cloud services, or designing and implementing cloud-ready networks.
To help ensure partners have a successful Year of the Cloud, today Cisco is announcing a set of cloud capabilities called CloudVerse to help partners build public, private, and hybrid clouds for customers — bringing together the intelligence of the network, the power of the data center, and the flexibility of cloud applications.
Here’s just one example of a unique offering: Cisco partner Logicalis built a customized hosted cloud solution for its clients. Watch this video to find out how they did it. Keep reading to learn about new CloudVerse services and technologies.
There’s no arguing that cloud usage is on the rise. By the year 2015, 50% of all CIOs expect to operate the majority of their applications and infrastructures via the cloud. And global cloud traffic will increase 12 times to 1.6 zettabytes per year – that is the equivalent of more than four days of business class video for every person on the planet.
Despite this meteoric increase in cloud usage, it’s still common for customers to tiptoe into the realm of cloud or shun it altogether, citinglack of cloud talent, concerns around overall user experience, security risks, and cost as major inhibitors to cloud deployment. That’s where Cisco and our partners come together to provide deep expertise in strategy, planning, design, implementation, and optimization.
What are the specific new technologies and services in CloudVerse? Read More »
GCT is proud to announce the FIPS Certification of the Cisco 5940 Embedded Services Routers (ESR), certificate # 1639. More information can be found at http://goo.gl/rcB83
The Cisco 5940 is a high-performance, ruggedized router. With onboard hardware encryption, the Cisco 5940 offloads encryption processing from the router to provide highly secure yet scalable video, voice, and data services for mobile and embedded outdoor networks. The Cisco 5940 Embedded Services Routers provide a scalable, secure, manageable remote access server that meets FIPS 140-2 Level 1 requirements. The Cisco 5940 Router Card uses industrial-grade components and is optimized for harsh environments that require Cisco IOS Software routing technology.
The Cisco 5900 Series Embedded Services Routers (ESR) are optimized for mobile and embedded networks that require IP routing and services. They can operate reliably in harsh environments, such as those subject to power surges and extreme weather conditions.
These routers are complemented by Cisco IOS Software and Cisco Mobile Ready Net capabilities. With this technology, they provide highly secure data, voice, and video communications to stationary and mobile network nodes across wired and wireless links.
FIPS-140 is a US and Canadian government standard that specifies security requirements for cryptographic modules. A cryptographic module is defined as “the set of hardware, software, and/or firmware that implements approved security functions (including cryptographic algorithms and key generation) and is contained within the cryptographic boundary.” The cryptographic module is what is being validated. The NIST website contains details on the Cryptographic Module Validation Program (CMVP).