Cisco Blogs


Cisco Blog > Government

Secure desktop virtualization and more highlights from Citrix Synergy

Last week I had the opportunity to attend the Citrix Synergy conference in San Francisco.   The conference was buzzing with the latest innovations for desktop virtualization, data center and cloud.   

Secure desktop virtualization infrastructure is compelling for government agencies seeking strategies to reduce costs, improve operational efficiency, and provide control and security of centralized desktops and mobile multi-media clients. 

httpv://www.youtube.com/watch?v=QLnmpbc-Pi4

Read More »

Tags: , , , , , , , ,

5 Ways to Securely Use Free Wi-Fi

Public Internet connections are convenient but potentially risky if you don’t take a few precautions.

Walk into any coffee shop or hotel lobby and you’ll witness one of the most obvious signs of our times: People of all ages and vocations browsing the web and checking email from their smartphones or laptops. If you get close enough to see what’s on their screens, you might even see some of these road warriors accessing business applications in the cloud, such as a salesperson checking into their customer relationship management (CRM) database or preparing for a meeting in an online collaboration space. But you have to wonder: how secure is that connection?

Before you give your employees the go-ahead to work outside the office, make sure they know how to securely log in to your small business network from Wi-Fi hotspots. Otherwise, any information they transmit could be up for grabs, from their email password to credit card numbers to confidential business data. After all, a public hotspot is essentially a network for unknown and risky computers, and you never know who may be lurking online to capture your critical data.

Read More »

Tags: , , , , ,

Security Schemes – Why Keep Them Public?

Should we or should we not keep our security protocols and algorithms public? The debate has been going on for quite some time. It might even have taken place in the Roman Empire when Caesar Cipher was used to encrypt Julius Caesar’s messages. It has been the norm for a long time for all new security methods to be published externally in order to receive academic and public scrutiny, in a way so that they prove themselves.

Read More »

Tags:

Cisco Live! Industrial Intelligence Day, 12th July 2011, Las Vegas

Let me tell you about a great opportunity if you’re an executive or professional in the Manufacturing or Industrial sector. Cisco is hosting a special ‘Industrial Intelligence Day’ on the 12th July 2011 at the Mandalay Bay in Las Vegas held in conjunction with Cisco Live.

The event is especially tailored to bring together manufacturing, controls, operations and IT executives and professionals. The theme of the day is ‘Industrial Intelligence’, and will cover the subject  of converging industrial automation systems based upon standard IP networks with business applications including voice and video to more responsively and cost-effectively manage industrial operations globally.

The day is packed with information, training, and industry best practices and is sure to be one of the smartest investments you can make in your career—and one of the smartest investments your employer can make in you.

By attending Cisco Industrial Intelligence at Cisco Live, you can:

  • Learn how Industrial Intelligence brings production closer to IT and converges industrial automation networks with business systems to improve the efficiency, safety, agility, and utilization of your production assets.
  • Receive training in architectures specific to industrial automation from Cisco and alliance partner Rockwell Automation including wireless and wired technology advancements, availability, security, sustainability and energy management.
  • Engage Industrial Intelligence and IT Networking thought leaders from our partners and the industrial analyst community via a live panel discussion plus join a community of manufacturing executives and IT and Control professionals deploying and operating Industrial applications and networks.
  • Experience and see “hands-on” demonstrations of Industrial Intelligence solutions and technology and interact with experts at the World of Solutions Expo at the largest Cisco user conference, Cisco Live.

Register by June 12th to receive the $100 off Early Bird offer. Click here to register.

Read More »

Tags: , , , , , , , , , , , , , , , , , , , , , , , ,

UNS Spotlight on VM-ready Security Solutions with VSG

The Unified Network Services (UNS) portfolio of Layer 4-7 services (such as ACE and WAAS) also includes Cisco’s data center security solutions. A critical part of that security portfolio is our virtualization-aware firewall solution, Virtual Security Gateway (VSG). In a series of upcoming blog posts, I’ll be sharing a few use case scenarios that our customers are implementing with VSG.

For those of you new to VSG, I’ll point out that VSG’s role is to act as a virtual firewall between zones of virtual machines. Isolating traffic between VM zones has been very challenging prior to VSG because: 1) security policies have to be enforced between VMs running on the same server or same virtual switch (where there’s no place to put a firewall), 2) VMs move all around the network and the security policies (as enforced in the firewall) must follow the VM, and 3) the need to maintain segregation of duties for compliance purposes between the security and application server teams, where security is potentially enforced inside the virtual server.

Read More »

Tags: , , , , , , , , , , , ,