In one of my previous posts, I noted how Network Access Control (NAC) platforms have started evolving into more visibility-focused and context-aware platforms in the face of major business trends such as enterprise mobility, the migration of resources to the cloud, and the ubiquitous Internet of Everything. Consequently, “new NAC” technology has quietly transformed from a complicated set of controls – outdated in a more mobile world – into a powerful business enabler for enterprises.
The Cisco Visual Networking Index (VNI) forecasts that over fifty billion new connected devices will hit networks by the year 2020. With this massive proliferation of network-enabled devices firmly in mind, I am proud to announce that the latest version of the market-leading Cisco Identity Services Engine (ISE) is now available. Cisco Identity Services Engine builds upon the solid foundation of our last release to round out the current platform by focusing on expanding the ISE partner ecosystem with new, exciting categories for context-aware security as well as advancing endpoint security capabilities.
Read More »
Tags: CLUS15, ISE, security
. Each new vulnerability requires a fire-drill to see if you’re vulnerable, if you have protective mechanisms, and to verify that your organization can detect attacks against your corporate network. On top of that, you may also receive bulletins from threat intelligence partners, law enforcement, and other warnings that require heightened vigilance and the ability to detect new attacks.
Hot threats board posted in each SOC
Read More »
Tags: ioc, MTD, OpenSOC, security, threats
“In our increasingly interconnected world, the Internet of Everything is making trust a critical element of how people use network-connected devices to work, play, live, and learn. The relentless rise in information security breaches underscores the deep need for enterprises to trust that their systems, data, business partners, customers, and citizens are safe.” – John N. Stewart, SVP and Chief Security and Trust Officer at Cisco
Trust and security is more important than ever before throughout the industry. Why aren’t customers explicitly demanding it be in all their IT systems? Why aren’t they demanding software developed with processes and technologies that drive security into all aspects of IT systems they buy? Why aren’t they demanding supply chain security and strong data protection? In short, why aren’t they demanding IT vendors produce more robust and secure solutions? Read More »
Tags: Cisco Security and Trust Organization, security, trust, trustworthy
What makes the cloud such an attractive option for enterprises? The cloud empowers IT to act as a broker of business critical IT services. It helps the organization become a more proactive player that can aggregate, integrate, and customize the delivery of cloud services to meet specific business needs. Instead of working in a technology vacuum or owning the entire IT value chain, IT can make build or buy decisions in the context of IT services sourcing recommendations.
Businesses in every industry are rapidly embracing the cloud. They want the agility, security, and performance that cloud technology delivers. And they want the flexibility to deploy their choice of workloads securely to the cloud. This growing demand for cloud services is creating new opportunities for cloud providers and driving new job roles and responsibilities.
Read More »
Tags: agility, CCNA, CCNP, certification, cloud, Enterprise, learning, performance, security, services
Today, enterprises need greater business agility and faster time-to-market for applications. That’s why, in many instances, they are building their own private clouds or adopting on-demand private cloud. Companies that are most suited to building their own private clouds are those that have deep engineering and IT leadership and need strong security and governance around applications and services.
Depending on the needs of the business and core competencies, other types of companies can benefit from a managed private cloud. For these companies, it’s not core to the business to be great at infrastructure, but it is crucial to be able to focus on the services offered on top of the infrastructure. These types of organizations may not have strict regulatory or data sovereignty requirements. Typically, they gain the most advantage from using managed private clouds.
Read More »
Tags: applications, as-a-service, automation, cloud, compliance, Enterprise, Governance, infrastructure, security