Cisco Blogs


Cisco Blog > SP360: Service Provider

Your Business Powered By Cisco Customer Solutions Architecture (CSA). What are Cisco CSA’s Benefits?

This is part 1 of the “Your Business Powered By Cisco Customer Solutions Architecture (CSA)” blog series.

Many IT organizations are challenged to take advantage of the new technologies enabled by Virtualization, Cloud, Analytics and IoT.  Applications enabled by these new technologies must be protected from unauthorized use but remain accessible, in a secure manner, from any device in any location throughout the world. With a vast array of new technology choices and a substantial installed infrastructure base, it is important to have a place to start --a solutions architecture-- that provides a framework for using these technologies that will drive business outcomes.

The CSA is a transformational customer-facing blueprint that delivers IT-based services for enterprise and service providers to achieve their business outcomes.  To be relevant for our customers, the CSA was developed based on disruptive examples that Cisco engineers observed in the industry during their discussions with both enterprise and service provider customers worldwide.

Some of these disruptive examples include use of new technologies such as: Analytics, Cloud, Internet of Things (IoT), Internet of Everything (IoE) and Cyber security.  It should also be stated that the front end for IT blueprint consulting is Cisco Consulting Services, and this CSA is representational of the sets of abstractions that describe the actual functions.

In all IT environments, both enterprise and service providers, Cisco sees two common trends: Read More »

Tags: , , , , , , ,

Visualizing a String of Paerls

Researchers from the Cisco Talos Security Intelligence and Research Team recently discovered an elaborate attack dubbed the String of Paerls. The attack, a combined spearphishing and exploit attempt, was able to bypass most antivirus engines and used a targeted phishing email that included a malicious Word document attachment. Upon opening the Word attachment, a macro downloaded and launched an executable on the victim’s machine, which then called out to command and control servers.

In the graphic below you can see an illustration of each of the major steps of the attack. A common thread is that Cisco security provides protection against attacks like this one using the approach of integrated threat defense. Specifically, Advanced Malware Protection tools were used throughout the discovery and analysis process to expose the exploit.

paerls-blog-1024x714

For a complete play-by-play of this attack, read the String of Paerls blog post from Talos. For more about integrated threat defense in our products, see the new Cisco ASA with FirePOWER Services.

Tags: , , , , , ,

The Foundation for a Business Relevant Network

With the growing influx of new mobile devices, connected things, bandwidth intensive applications and more data, the network is more relevant to business success than ever before.  Back in June of 2012, Cisco saw that we needed to move away from multiple network systems loosely linked together to an agile and simple infrastructure, streamlined policy and centralized management would be needed to support new business demands. We called it Cisco Unified Access and we aligned the solution to three pillars: One Network, One Policy and One Management.

For the last few years, we have focused on delivering new products and functionality under this Unified Access model. Below is a timeline of products released as part of the Unified Access framework. Cisco lead the way in delivering gigabit 802.11ac Wi-Fi., converged wireless control in access switches and through the acquisition of Meraki – a complete cloud-managed network solution.

foundation

The timeline above doesn’t represent every feature and function we have delivered, but it shows Cisco’s commitment to this Unified Access model, both from a cloud-managed and on-premise solution perspective.

Today, Cisco is announcing a number of new products and new functionality to existing products that will help mobilize the workforce, secure the business and increase IT agility. The announcement includes the following: Read More »

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

Leverage Those APIs

Cisco IT has always strived to improve the user experience.  It is often overlooked in some IT organizations, but Cisco IT has service managers who are held accountable for the feedback they get for their service sectors.  This focus on how we perform means we are constantly pushed to improve how users interact with the technology. Read More »

Tags: , , , , , ,

Cisco Identity Services Engine (ISE) Further Expands Technology Partner Ecosystem

It’s the 25th anniversary of the film Field of Dreams, the movie about an Iowa farmer who hears a whisper that says, “If you build it, he will come.” Given the need for control with context for secure access initiatives, we did build it–and they have come.

After its introduction last year, momentum has continued for the Cisco Identity Services Engine (ISE) partner ecosystem, enabled by Cisco pxGrid, our robust context-sharing platform.

The Cisco ISE partner ecosystem began with an idea to create a group of best-in-class IT infrastructure partners who use the deeper level of contextual data collected by ISE, our security policy management platform for access control and security compliance, enabling IT organizations to have a consistent method of making their IT platforms identity, device and network aware. This enables deeper, broader network and security insight, makes network and security events more actionable and allows for consistent, cross-platform user and device visibility and control. Read More »

Tags: , ,