Cisco Blogs


Cisco Blog > Security

Introducing the Industry’s First Threat-Focused Next-Generation Firewall

Cisco is a strong proponent for shifting the mindset regarding the capabilities a Next-Generation Firewall (NGFW) must provide to stay relevant in a world that is dealing with dynamic threats. While nothing is technically wrong with legacy NGFWs, much is wrong with their approach.

To meet current and future needs, a NGFW must now provide full visibility and contextual awareness across applications, hosts, and the network, address dynamic threats, quickly correlate and identify multi-vector threats and deliver the dynamic controls organizations now require to combat advanced threats. It must do all of this while reducing complexity. These capabilities are crucial for enabling continuous protection across the attack continuum—before, during and after an attack.

Read More »

Tags: , , , , ,

Working Remotely Just got Better With OfficeExtend 600 Series AP’s

It’s always been important to remote workers to have a solution that provides both secure connectivity to their corporate network and simple user experience.With the recent Summer Blockbuster release of the Cisco Wireless Release 8.0, using the OfficeExtend 600 Series Access Points (OEAP-600) just got better.  Here are a few of the enhancements that come to OEAP-600 with Release 8.0:

  • Firewall for personal networking -- Provides port/application protection for personal network traffic that can be controlled by the end user. While the corporate firewall is protecting your corporate data traffic, you now have the capability to make your personal network traffic more secure also with this feature.
  • Split-tunnel for Internet traffic -- Enables corporate clients to reach the Internet directly through the WAN instead of tunneling the data traffic through the corporate network. Provides the IT administrator the flexibility to configure the level of split-tunnel capability needed for their network. Together with the existing Split-tunnel for Printer feature the OEAP-600 provides maximum flexibility for printing and managing data traffic between the remote & corporate office.
  • QOS Enhancements for Voice traffic – Assigns high priority for voice packets for remote workers using the OEAP-600 and a VOIP solution in their home or remote office to enhance the remote workers voice call experience. Read More »

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

Prepare for Data Breaches! They Will Happen … to Anyone

September 15, 2014 at 5:05 am PST

Do you feel that you’ve been hearing a lot about data breaches lately? You are right! Take a look at the chart below. There is plenty of time left in September, but the data breach calendar is already filled with victim names. And August? I don’t even have enough space to put down all the victim names.

If anyone believes that if we do a great job, we can fully guard our data and valuable information assets against attacks and breaches, now it’s time to think again. The reality is, data breaches can happen to anyone. They are happening everywhere from household names, to lesser-known businesses or organizations, and  to the mighty government of the United States. The question is no longer “if”, it is “when”.

However, this does not mean that we will just give up. On the contrary, we need new thinking. And get prepared. We need to be prepared before breaches take place to minimize their chances to succeed. We need to be prepared during breaches to detect and stop them. And we need to be prepared to rapidly apply mitigations after breaches. We cannot totally eliminate these risks, but we can control and minimize them. Read More »

Tags: , , ,

International Security Demands 100% Network Uptime

Nuclear security is a high priority international threat today. The Nuclear Security Summit (NSS) 2014 took place in The Hague, the Netherlands, following the summits in Washington D.C (2010) and Seoul (2012).

NSS 2014

Network Requirements:

An event of this magnitude required nothing but the best network solution. The venue had existing small networks across 5 buildings and 4 tents. They decided to disable the existing networks and setup a comprehensive Cisco network solution exclusively for this event. The major requirements were: Read More »

Tags: , , , , , , , ,

Addressing Cyber-Security Challenges of Today and Tomorrow

Did you know that Cisco detects over 1.5 million intrusion attempts on Cisco’s network every day? With more than 13 billion NetFlow records captured daily, over 22 Terabytes of traffic inspected, and 750 Gigabyte of system logs collected on a daily basis, it’s changing the landscape for how to secure intellectual property, confidential information, and mitigate malicious attacks.

This brief video shares relevant security information, real-world experiences to help educate customers on security threats, and technology solutions deployed to secure Cisco’s intellectual property.

Tags: , , , , ,