Cisco Blogs


Cisco Blog > Innovation

A New Security Paradigm Needed to Support the Internet of Things

Shutdown. Cleanup. Restart.

This “incident response” approach to cyber security was designed primarily for enterprise networks, data centers, and consumer electronics. It companies perimeter-based protection that uses firewalls, intrusion detection systems (IDS) and intrusion prevention systems (IPS) to prevent security threats.

When threats penetrate perimeter-based protections, human operators typically shut down the compromised system, clean up or replace the compromised files and devices, and then restart the system.

Next is forensic analysis. This, too, requires intensive human involvement to harden existing protection mechanisms and develop future remediation measures.

However, as we move into the next phase of the Internet—the Internet of Things (IoT)—this security paradigm won’t be adequate because of changing form factors and use cases.

To succeed, we need fog computing. This will extend cloud computing (including security) to the edge of an enterprise’s or consumer’s network. Much in the way cloud technology enabled the Internet, fog will enable an array of secure IoT possibilities.

Read More »

Tags: , , , , , , ,

Secure Without Compromise

This is part of a series on the evolution of the Cisco Collaboration Cloud platform, exploring the technical and design principles behind its unique architecture.

So far in this series, we’ve learned about two ways the Cisco Collaboration Cloud is revolutionizing enterprise communications technology:  through its exceptional user experience and its hybrid capability. A third is security. Security ensures our customers are always in control of their own data and is fundamental to everything we do.

For IT, the question you really need to ask is a simple one: Does the collaboration platform protect my content from the prying eyes of others, including the vendor, or doesn’t it?

There is no gray area for collaboration security.

Our on-premises products, such as Cisco Unified Communications Manager, have traditionally put the decision about whether to use “Secure Mode” into the hands of the administrator. Secure Mode controls device profile security and media encryption. With entirely on-premises technology, administrators could decide whether the effort required to enable Secure Mode was justified for their enterprise.

More often than not, administrators decided to leave Secure Mode turned off. Let’s be clear: the administrator’s decision not to enable security was a failure on our part. We presented the administrator with an option to choose security that was only as secure as their network perimeter, which required zero effort or expense. Read More »

Tags: , , , ,

Healthcare Security: Improving Network Defenses While Serving Patients

Safeguarding patient information is critical for healthcare providers. From HIPAA regulations for patient record privacy to PCI standards for credit card processing, there are many areas where information can be compromised.

In our newly released white paper, Healthcare Security: Improving Network Defenses While Serving Patients, we identify areas in which healthcare organizations can make changes to better address threats facing their organizations by implementing improved security defenses.

Healthcare Security PaperIn a related study, we surveyed CISOs and SecOps managers and found that:

● Chief information security officers (CISOs) in healthcare are more likely than security operations (SecOps) managers to believe that their security processes are optimal.

● Healthcare organizations do not implement as many strong security defenses as organizations in other industries.

● When healthcare organizations experience a breach, they may be more likely to implement a wider array of security defenses.

We invite you to read the new White Paper to learn how Cisco can help enable compliance and help you to prevent your organization from suffering a potentially devastating cyberattack.

 

Tags: , ,

CCIE : ITD and RISE in CCIE Data Center

ITD and RISE are now part of CCIE Data Center:

https://learningnetwork.cisco.com/community/certifications/ccie_data_center/written-exam-v2/exam-topics

Intelligent Traffic Director (ITD) is a hardware based multi-terabit layer 4 load-balancing, traffic steering and services insertion solution on the Nexus 5k/6k/7k/9k series of switches.

Domain Written Exam (%) Lab Exam (%)  
1.0 Cisco Data Center L2/L3 Technologies 24% 27% Show Details
2.0 Cisco Data Center Network Services 12% 13% Hide Details
2.1 Design, Implement and Troubleshoot Service Insertion and Redirection

  • 2.1.a Design, Implement and Troubleshoot Service Insertion and Redirection for example LB, vPATH, ITD, RISE

2.2 Design, Implement and Troubleshoot network services

  • 2.2.a Design, Implement and Troubleshoot network services for example policy drivenL4-L7 services
3.0 Data Center Storage Networking and Compute 23% 26% Show Details
4.0 Data Center Automation and Orchestration 13% 14% Show Details
5.0 Data Center Fabric Infrastructure 18% 14% Show Details
6.0 Evolving Technologies 10% N/A Show Details

 

To learn about RISE (Remote Integrated Services Engine), please see: http://www.cisco.com/go/rise

To learn about ITD (Intelligent Traffic Director), please see: http://www.cisco.com/go/itd

http://blogs.cisco.com/datacenter/itd-load-balancing-traffic-steering-clustering-using-nexus-5k6k7k9k

 

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

Your Right to Choose Your WAN Connectivity and Your Right to Security

Still too often, nowadays, I look at my phone and my stomach drops.

I see: “3G”…

Even worse, I see: “1x”…

I think to myself: It’s the year 2015 and the world is becoming increasingly digitized. IDC’s Internet of Things Forecast states that there will be 4 billion people using 50 billion devices all in one hyper-connected world. I (along with 3,999,999,999 other people) believe it is my right to always have a consistent and high-performing 4G-LTE connection.

For the enterprise, Cisco’s SD-WAN Bill of Rights talks about what customers should expect and demand as they prepare their WAN for tomorrow. Among these rights are two that are very important to branch security in particular: Read More »

Tags: , , , , , , , ,