Looking for technology inspiration? Imagining the IT possibilities? Look no further. Interop 2012 is finally here this week! Showcasing the latest innovations in technology in networking, security, cloud computing, virtualization, mobility portfolios plus much more, it is bound spark new ideas for IT initiatives. With several demonstrations, speakers in 12 panel discussions, three products as finalists for Best of Interop, many of us from Cisco will be there, asking you: “what can we help you build?”
To help get the most out of what is happening at Interop, check out, ‘Insiders Guide to Optimization at Interop’ . It gives a great suggestion for an itinerary with the highlights of Interop 2012. Personally, I am especially looking forward to the keynote “Cisco Innovation. In it to Win It.” by Cisco CTO and head of engineering, Padmasree Warrior. With advancements happening so quickly in business technology, there will be many panels and educational sessions that Cisco will have to assist customers in migrating to the cloud, managing and maintaining BYOD policies, and increasing collaboration and productivity and learning about IPv6.
Not able to get to Interop but still have questions? Don’t worry, the fun geeks you can trust of Cisco’s TechWise TV will also be in Las Vegas bringing content to those there and at home:
With so many speakers and panels, don’t forget to stop by booth #1127 to say hi, get answers to questions, get a tour, check out the in-booth theater, and view the many products that will be demonstrated throughout the week. Safe travels and I look forward to seeing you there!
Tags: cloud, interop, las vegas, security
As part of CSIRT’s mobile monitoring offering for special events, we undertook monitoring of the corporate and customer traffic of the Cisco House at the London 2012 Olympics. This engagement presents us with an excellent opportunity to showcase Cisco technology, while keeping a close watch on potential network security threats. CSIRT monitoring for this event will be active for the entire life-span of the Cisco House, from two months before the Olympics, until two months after.
For the London 2012 engagement, we shipped our gear in a 14RU military-grade rack that is containerized: made for shipping. Inside the mobile monitoring rack we have an assortment of Cisco kit and third-party kit that mirrors the monitoring we do internally:
- Catalyst 3750 to fan out traffic to all the other devices
- FireEye for advanced malware detection
- Two Cisco IronPort WSA devices for web traffic filtering based on reputation
- Cisco UCS box where we run multiple VMs
- Lancope StealthWatch collector for NetFlow data
- and a Cisco 4255 IDS for intrusion detection
We mirror the signatures that we have deployed internally at Cisco out to these remote locations. Depending on the environment where the mobile monitoring rack is deployed, we may also do some custom tuning. The kit in the mobile monitoring rack can do intrusion detection, advanced malware detection, and collect and parse NetFlow and log data for investigation purposes. The Cisco UCS rack server also helps us have several VMs, allowing us to run multiple tools that complement the other devices in the rack. For example, we run a Splunk instance on a VM to collect the logs generated by all the services. The data from the gear in the mobile monitoring rack is analyzed by our team of analysts and investigators, to eliminate false positives, conduct mitigation and remediation, and finally produce an incident report if required.
Read More »
Tags: 2012_Olympics, CSIRT, infosec, Ironport, it security, London Olympics, malware, olympics, security, TRAC, web security appliance
Networked technologies have made work and learning increasingly mobile and highly flexible. So much so that employees are now choosing work-location flexibility over a higher salary and employers are providing workers with the tools to facilitate this. Cisco IBSG calls this “Smart Work.” Of course, the ability to make flexible working a viable option depends on a number of factors, including availability of good broadband connectivity, employer trust, the nature of the work in which an employee is engaged, and suitable social software and video technologies that enable the employee to remain in a connected (albeit virtual) work environment.
Employees, too, have to develop a new form of self-discipline that involves maintaining a good work-life balance; rather than working longer hours, this entails spending much of their extra time with family, in the community, or furthering their own personal and professional development. Read More »
Tags: Big Data, Cisco, cloud services, device proliferation, future of work, IBSG, infrastructure, network, S+CC, security, smart applications, Smart+Connected Communities, urban services, urban sustainability, work-life
Are you interested in how enterprises and service providers are making and saving money via cloud? Last week, Cisco hosted a live webcast featuring IT executives from CSC, Sprint, and Educational Testing Service (ETS) who discussed the economic benefits of cloud computing for their businesses and their customers.
This session provided real-world perspectives into the cloud adoption of major enterprises and service providers, as cloud computing continues to transform businesses through improved agility, better economics, enhanced security and a dynamic, assured experience. The executives discussed the economic benefits derived from cloud business models and shared examples of how cloud computing is changing their industries.
Take a moment to hear how these businesses are revolutionizing their models through cloud adoption.
Tags: cloud_computing, private cloud, Public Cloud, security
Security professionals are planners by nature. Our industry expects planning, legal and standards compliance requires it, and we drive ourselves toward it. However, the best plans fall out of date quickly. And as the adage commonly paraphrased as “no plan survives contact with the enemy” states, even properly maintained, up-to-date, and well-thought-out plans may fall apart during an incident.
What’s the remedy? We certainly shouldn’t throw out our plans. Instead, we should test and adjust our plans so that when the real enemy shows up, we might have a plan that survives, at least from a broad perspective. In short: security professional, hack thyself!
Read More »
Tags: penetration testing, security