On January 28th , Cisco launched the Intercloud solutions . On the tail of this announcement, we invited a couple of Cisco Champions to share their perspectives on hybrid cloud and Intercloud with one of our subject matter experts . This was our first Champion podcast.
Eric Wright (@discoposse) and Jonathan Davis (@subnetwork) joined Cisco Mark Loesel to talk about cloud trends, opportunities and challenges companies have to face to deploy a cloud model, and the benefits of intercloud solutions.
Listen to this podcast, hosted by @commsninja.
Amongst the topic covered in this first edition, you will find conversations about
- The evolution of the cloud market
- Embracing hybrid cloud
- When public cloud can’t work for an organization
- The impact of shadow IT
- The importance of security
- The Cisco Intercloud solution and the policy model
- How open do you want your solution to be
- The challenges to the deployment of hybrid cloud
- How cloud will mature
To go further, I encourage you to check the following blogs on Cisco Intercloud- You will find also excellent pointers for additional information.
If you are not familiar with the Cisco Champions, I encourage you to read the blog from Colin Lynch (@UCSGuru) posted last month : What does it mean to be a Cisco Champion?
Tags: cloud, Hybrid Cloud, InterCloud, policy, security
One of the big lessons I learned during the early days, when I was first creating Snort®, was that the open source model was an incredibly strong way to build great software and attack difficult problems in a way that the user community rallied around. I still see this as one of the chief strengths of the open source development model and why it will be with us for the foreseeable future.
As most every security professional knows, cloud applications are one of the most prevalent attack vectors exploited by hackers and some of the most challenging to protect. There are more than 1,000 new cloud-delivered applications per year, and IT is dependent on vendors to create new visibility and threat detection tools and keep up with the accelerating pace of change. The problem is that vendors can’t always move fast enough and IT can’t afford to wait. Countless custom applications pile on even more complexity.
So today, Cisco is announcing OpenAppID, an open, application-focused detection language and processing module for Snort that enables users to create, share, and implement application detection. OpenAppID puts control in the hands of users, allowing them to control application usage in their network environments and eliminating the risk that comes with waiting for vendors to issue updates. Practically speaking, we’re making it possible for people to build their own open source Next-Generation Firewalls.
Read More »
Tags: Next-Generation Firewalls, open source, OpenAppID, security, Snort, Sourcefire
Security trends and innovation are in the spotlight this week at the annual RSA Conference in San Francisco. With the rapidly expanding attack surface and increasingly sophisticated attackers, the event is a must for insights on how the industry can meet this pace of change, evolve and defend against advanced threats. Solving our customers’ toughest security challenges is our number one priority and we’re pleased to share Cisco innovation -- both technology and thinking — that will better help you protect against threats across the attack continuum – before, during and after an attack.
For starters, we’re delivering new product innovation by adding Advanced Malware Protection (AMP) to our Web and Email Security Appliances and Cloud Web Security. We are calling this “AMP Everywhere” because of its pervasive protection from the cloud to the network to the endpoint. This broad protection is made possible through the combined power of Cisco, Sourcefire and Cognitive Security technologies, integrated to bring you the best end-to-end solutions to combat Advanced Threats.
Read More »
Tags: cybersecurity, security
There is no turning back from the mobile trend. With more devices comes the insatiable hunger for bandwidth. After devices are connected to the network, IT must make sure each is secured and provisioned. Creativity is needed to handle these high-density environments and enforce proper policies for mobile security, while juggling other responsibilities for the business. That complexity can be a huge headache. IT needs tools that can help make the whole process simple and fast.
Enter Cisco’s secure enterprise mobility solutions. Cisco’s 802.11ac (the latest Wi-Fi standard that enables more devices and bandwidth), Cisco Identity Services Engine (ISE), and Cisco TrustSec solutions join forces to simplify the high-density, secure mobility experience.
Join us for an engaging webcast on March 5 and learn how this combined Cisco solution can relieve your mobile device management and security headaches. Hear how Erickson Living, a trusted name in retirement communities known for innovative approaches to supporting resident needs, relied on this Cisco solution to provide high-quality, secure connectivity and a simple user experience.
Register today to learn how Erickson was able to level up to 802.11ac with heavy considerations for mobile security and how Cisco provided the tools to easily manage always-on, secure wireless access.
Get your questions answered with live Q&A. You will not want to miss this webcast. Register here.
Tags: 11ac, 802.11ac, access, bandwidth, Cisco, complex, connect, device, Enterprise, fast, IT, mobile, mobility, network, phone, secure, security, simple, tablet, technology, tool, user experience, VLAN, wi-fi, wifi, wireless
In the next few years, there will be more mobile users and more mobile connections than ever:
- By 2018, there will be 4.9 billion mobile users, up from 4.1 billion in 2013, according to the newly released Cisco VNI forecast
- In addition, there will be 10 billion mobile-ready devices and connections, which includes 8 billion mobile devices and 2 billion machine-to-machine (M2M) connections
Are the networks that are in place today able to handle the influx and sophistication of devices and data, or is this wave of technology going to usher in a need for a different kind of network?
I don’t think I’m alone in saying that organizations need a flexible, programmable infrastructure that can expand and contract more readily to their needs, especially in terms of security. A security-centric, programmable infrastructure that detects and responds to emerging threat vectors is essential for organizations to thrive in our hyper-connected era.
However, many business and IT leaders are unsure of what that looks like. How can a programmable infrastructure examine security holistically and gain visibility across the entire cybercrime continuum—before, during, and after an attack?
Read More »
Tags: 2014 annual security report, Cyber Attacks, Fast IT, Future of IT, IoT, Ponemon Institute, programmable infrastructure, security, vni, Watering Hole