Cisco Blogs


Cisco Blog > Security

Cisco at RSA 2012: A Sneak Peek

Last year at the RSA security show, Cisco announced the SecureX security strategy. SecureX is designed to help organizations address security from a holistic perspective, rather than a siloed approach, using an integrated framework of innovative new security devices blended with the security-aware network. This approach allows organizations to truly address critical issues like BYOD and the consumerization of network enabled devices, the transition to virtualized data centers and cloud-based computing, the flood of data coming from social media sites and the use of new high-bandwidth services such as video collaboration, and the spread of sophisticated new attacks aimed at your organization’s soft spots. Cisco also announced powerful new tools to increase the reach and efficacy of security. The first was the addition of context awareness to security and network devices to add real granular control over users and devices. We also announced a powerful new policy-based solution, the Cisco Identity Services Engine, which allows organizations for the first time ever to truly take control of security policy creation, deployment, enforcement, and management. Next, we announced the broadening of our Security Intelligence Operations that allows us to fine tune our entire family of security solutions in real-time with actionable data gathered from hundreds of thousands of sensors located across the globe. Cisco SIO is now the largest threat telemetry service in the world. And in the year since that announcement we have continued to deliver innovative new devices and technologies designed to address security issues, from the endpoint, across the edge and branch, and out across the virtualized data center and cloud environments. So this year, at RSA 2012, Cisco will announce our plans to continue to drive innovation and revolutionize security through our SecureX strategy. For those of you heading out to this year’s event, here is a sneak peek at what you can expect:
Read More »

Tags: , , ,

Block a country with my Cisco Router or Firewall

Problem:

We are often asked by customers about how they can prevent traffic from a certain country (let’s say country X) from entering their network. The motivations for doing this could vary. Sometimes a company does not do business with all countries in the world; therefore, the company doesn’t need to be accessible from all countries. Other times it is an issue of trust and security, where an administrator may not want to allow country X to enter their infrastructure. Finally, there are cases where country X has often been incriminated with malicious activity, so an administrator may want to block country X when there is no need for the organization to interact with this country. In this document I present a methodology on how to write a tool that provides the configuration lines to block country X, using your IOS router or ASA/ASASM firewall.
Read More »

Tags: , , , , , ,

With Proper Set Up, Telepresence Need Not Pose Security Concern

February 14, 2012 at 11:36 am PST

In October, we wrote about the federal government’s move toward installing video and telepresence capabilities on mobile devices to improve communication, especially for law enforcement and defense purposes. With mobile telepresence, the government can enhance collaboration and response time during critical events.

A recent New York Times article reminds us, however, that to safely realize all of the benefits of telepresence, the government—or any organization—needs to ensure proper implementation of the video technology. Obviously, security concerns multiply when numerous mobile devices attach to a telepresence network.

Read More »

Tags: , , , , ,

Cisco at RSA 2012: Putting Things In Context

It’s that time of year again. The annual RSA security show brings together all the major security vendors under one roof for a week of training, announcements, and vendors hawking their latest wares. This year we can expect the usual cadre of legacy security vendors with their stand-alone, siloed products pretending that they now support clouds and mobile workers and BYOD. Booth babes, jugglers, magicians, and flashy giveaways will fill the exhibit halls while vendors play shell games with the security of customers, all adding a cacophony of noise to an already confusing situation.

Amidst all the hoopla and fanfare, however, Cisco Systems, the largest security vendor in the world, will be there with perhaps the only reasonable strategy for securing the networks organizations are creating today.

Read More »

Tags: , , , , , , ,

Security Practices for Online Collaboration and Social Media

February 10, 2012 at 9:00 am PST

In my last blog we discussed how on-line tools for desktop sharing, audio and video collaboration, and enterprise social software play an increasingly important role in corporate business. We discussed how the industry is also seeing a trend toward “IT consumerization,” where employees and other users experience new technologies before they are supported by enterprises. The first impact of this trend is producing more employee requests to access their personal social media accounts from their work computers as a way to manage both work and life responsibilities. The even bigger impact is that employees want to use these types of collaboration tools for enterprise business purposes.
Read More »

Tags: , , , ,