Connecting the Unconnected
“The Internet of Things is the next technology transition where devices will allow us to sense and control the physical world by making objects smarter and connecting them through an intelligent network”, Lindsay Hiebert, Senior Marketing Manager, Internet of Things, Cisco Systems
The Internet of Things in a Manufacturing Plant Environment
The Internet of Things is the network of physical objects accessed through the Internet. These objects contain embedded technology to interact with internal states or the external environment. This technology allows objects within such places as manufacturing floors, energy grids, healthcare facilities, and transportation systems to be controlled from virtually anywhere in the world. This connectivity also means more data can be gathered from more places, with more ways to increase efficiency and improve safety and security. The Internet of Things and the Internet of Everything (people, process, data and things) is about connecting the unconnected.
Read More »
Tags: 14.4 Trillion Value At Stake, 700 IoT Products and Solutions, Application Enablement Platform, Cisco, Cisco IP Cameras, cloud, connecting the unconnected, Energy Grids, Fog computing, Heathcare Facilities, Internet of Everything, internet of things, IoT, IoT Partner Eco-System, IOx Framework, IP67 Rated, Manufacturing floors, security, Transportation
Gartner has released their 2014 Magic Quadrant for Wired and Wireless LAN Infrastructure. For the 3rd year in a row, Cisco is recognized as a leader in both vision and execution. We believe this Gartner recognition is validation of Cisco strategy and investments for unified access, policy management and cloud managed solutions.
Cisco’s position in the Wired and Wireless Gartner MQs has been consistent over the past 3 years as the market landscape has shifted we believe validating our commitment to meeting shifting customer priorities and requirements.
The 2014 Gartner Magic Quadrant for the Wired and Wireless LAN Access Infrastructure (Authors: Tim Zimmerman, Andrew Lerner, Bill Menezes; Published 26th June 2014) reflects the evolution from prior years and highlights what customers are looking for:
“With limited growth in IT resources, administrators require one network management application, one access security solution, one guest access application or one policy enforcement solution with the flexibility to be deployed in a public cloud, private cloud or on-premises. This integration reduces the costs associated with the upfront capital expense of multiple network service applications each dedicated to either the wired infrastructure or the wireless or cloud components. This savings is also extended to the ongoing software maintenance costs of all access layer management, security and policy enforcement components.”
What Does Being a Leader Mean? Read on for the full story Read More »
Tags: #80211ac, #wireless, 802.11ac, access, access point, analyst, App, application, aruba, Cisco, customer, data, enforcement, Gartner, HP, Industry, infrastructure, IT, LAN, landscape, leader, Magic Quadrant, market, mobile, mobility, MQ, network, policy, quadrant, secure, security, service, technology, unified access, wifi, wired, wireless, wlan
The title seems like a simple enough concept, but when it comes to advanced threat protection, truer words were never written. This concept of visibility into your network, which in turn enables better protection and control of your network, is at the heart of Cisco’s Next-Generation Intrusion Prevention System (NGIPS). Visibility is what feeds critical capabilities in the solution and it’s also what sets our NGIPS apart from other IPS products.
In the coming weeks, we’ll focus on different aspects of our market-leading NGIPS solution, as recognized by third-party groups such as Gartner and NSS Labs, but since NGIPS is all about threat protection – and you can’t protect what you can’t see – let’s start with visibility.
Historically, IPS products have provided visibility into network packets to be able to identify and block network attacks. The last couple of years have seen next-generation firewalls get a lot of industry buzz by providing visibility (and subsequent control) into applications and users.
Read More »
Tags: IPS, NGIPS, security
In the past few weeks, I’ve received two replacement credit cards. And, no, this does not indicate I’ve done too much shopping! It means that hackers are continuing to target retailers and the bank decided I needed to be protected by new credit card numbers.
I’m Carol Ferrara-Zarb, and as the leader of Cisco’s Security Solutions team, I’m joining the Cisco Retail blog today to talk to you about security and compliance in the store. While consumers certainly worry about security, the concerns of retailers are magnified because you are among the highest-profile targets right now for professional hacker attacks. Store owners and operators are just about lying awake at night wondering who is going to be next.
At the same time, change is continuing on the security front, particularly in the area of PCI compliance. At the end of this calendar year, the new 3.0 version of the PCI DSS mandate will come into force. Are you ready for the new requirements?
If you’re a Cisco customer, you very well may be. Join us on July 23 for a free, one-hour webcast called, “Straight Talk about Reducing Complexity and Maintaining Compliance in Retail.” Cisco Security Architect Christian Janoff, who sits on the PCI Security Standards Council Board of Advisors, and Aaron Reynolds, PCI Managing Principal for Cisco partner Verizon, will lead a candid discussion on retail security. The session covers:
- The changes in the PCI DSS 3.0 mandate and their impact on your retail business
- How to satisfy three standards—PCI, SOX, and HIPAA—by configuring one control
- Implementing the latest, simplified strategies for PCI scope reduction, and how they can be superior to traditional methods for many retailers
You’ll come away with an overview of today’s threat landscape, and we’ll put it all into perspective to support your continued pursuit of compliance and retail success. Registrants will also receive the Simplifying Compliance Answer Kit, a set of documents and tools to help you understand compliance better.
The webcast takes place on July 23 at 10:00 am PT/1:00 pm ET. Please register today! Be sure to bring your questions to take part in the discussion.
We’ll see you there!
Tags: Carol Ferrara-Zarb, compliance, credit card, customer, data, HIPAA, information, pci, retail, security, shopper, sox, standard, threat, webcast
As a business or technical leader, you know you need to protect your company in a rapidly evolving mobile ecosystem. However, threats are not always obvious. As malware and attacks become more sophisticated over time, business decision makers must work with technical decision makers to navigate security threats in a mobile world.
This blog series, authored by Kathy Trahan, will explore the topic of enterprise mobility security from a situational level and provide insight into what leaders can do now to mitigate risk. To read the first post focused on securing device freedom, click here. – Bret Hartman, Chief Technology Officer (CTO) for Cisco’s Security Technology Group
Imagine two of your executives are using a SaaS platform while working off an unsecure hotel Wi-Fi network nearby. Did you know that SaaS and B2B applications are 15 times more likely than pornography to deliver malicious content across a network?
The threats against a remote connection are unfortunately very real and using an unprotected network to access company assets (whether on-premise or in the cloud) can have serious consequences.
As the growth of mobility and cloud blur the lines of our personal and business lives, the “mobile cloud” has drawn users (consumer or employee) to its convenience. According to a recent Gallup poll, nearly 80% of workers had positive feelings for using their own computers and mobile devices to stay connected to work outside of normal business hours.
For IT, the mobile cloud offers huge management efficiencies. Recent Cisco mobility research confirms that mobility strategies are converging with cloud strategies. However, it also forces IT and business leaders to find a happy medium between encouraging corporate productivity and addressing a new wave of security concerns. From the same research, nearly half of the organizational leaders surveyed say security risks can prevent them from moving forward with mobility initiatives.
Despite these risks, It is hard to dispute that off premise access provides significant productivity gains especially as organizations see mobility as a competitive edge to embrace.
As more mobile users enter the market, (over half a billion devices were added just last year) and the number of remote workers becomes more ubiquitous, the expectation is that networks and access should be the same, regardless of location.
Read More »
Tags: Cisco, future of mobility, mobile security, mobility, security