Cisco Blogs


Cisco Blog > Security

Network Solutions Customer Site Compromises and DDoS

July 17, 2013 at 10:03 am PST

Network Solutions is a domain name registrar that manages over 6.6 million domains. As of July 16, 2013, the Network Solutions website is under a Distributed Denial of Service (DDoS) attack. Recently, Network Solutions has been a target for attackers; in a previous outage, domain name servers were redirected away from their proper IP addresses. This was reported to be a result of a server misconfiguration while Network Solutions was attempting to mitigate a DDoS attack. It is possible that the DDoS attacks are related.

According to isitdownrightnow.com, the Network Solutions site has been having issues for at least the last 24 hours.

response_time

Response time in ms (GMT -8:00)

Read More »

Tags: , , , , , ,

Three Imperatives for Today’s CISO for Data Center Security: Key Takeaways from Today’s Webcast

This is a follow up from my post last week that announced this webcast. Today it was a treat to have Richard Noguera as our special guest and who is uniquely qualified to speak on the topic of key imperatives for today’s CISO for the data center.  Rich is a youthful InfoSec veteran who has led teams at Yahoo, Symantec and McAfee as well as held consulting roles and presently at Accenture in a Security and Risk management strategy role. I wanted to provide you access to the slides as well as summarize some of the key points Rich educated us on today.

Three imperatives for today¹s ciso for data center fina lv rn[2] from Cisco Data Center

 

As a concept, cloud is the one that most interested our audience today. We are seeing heavily virtualized data centers with private clouds, cloud attached data centers that leverage Infrastructure as a Service (IaaS) facilities for rapid service deployment or capacity management, and hybrid clouds that mix/match based on implementation needs.  Most of our customers have embraced one of the above models.  And, so I am going to focus on our imperatives accordingly.

Imperative 1: Enable IT to Play a More Strategic Role

Gartner predicts with market maturity that enterprises will increase migration of *mission-critical* functions to *public* cloud services over the next 3-5 years. IT and InfoSec must adapt and consider an alternative means to maintain the confidentiality, integrity, and availability of their business services, data, and users. For the ‘extended enterprise’ to operate effectively then, access control and data exchange between cloud service providers (CSP) needs to be standardized. Organizations should look to implement a Cloud Services Brokerage (CSB) – whether internally or externally, utilizing private/public/hybrid clouds – to accelerate service implementation and integration and also ensure visibility and cohesive security policy across multiple cloud service providers.

Imperative 2:  Business-driven Security and Risk Metrics

Read More »

Tags: , , , ,

Partnering with Apple on BYOD and Great User Experience

Mobility extends beyond devices. Yet, having the right devices and choice of devices allows us to work the way we’d like. In fact, Cisco is one of the world’s largest enterprise users of Apple products. Employees have purchased 33,000 iPhones and 16,000 iPads as part of Cisco’s BYOD program, and almost half of our regular employees are using Macs.

Recently Cisco’s Sheila Jordan, Senior Vice President of Communication and Collaboration IT spoke with Apple about BYOD, as part of Apple’s Tech Talk series. Here she and Brett Belding, Senior Manager, Cisco IT, discussed what’s behind Apple’s popularity at Cisco. They also address what enterprises like Cisco can emulate  what Apple has created for consumers in terms of user experience and bring that into today’s mobile enterprise.

Check out Sheila’s blog “Partnering with Apple on BYOD and Great User Experience” where she discusses the Apple Tech Talk and Cisco’s mobile and collaboration strategy.

Tags: , , , , , , , ,

Enterprise Apps: The Next Wave in Mobile Transactions

Earlier this year, I was having a business dinner with an important client in London when I received an IM on my iPhone. The message was from a Cisco colleague, and it said, “I need you to approve a purchase order. Right now.”

So I stepped away from the table, launched an app on my iPhone, read the purchase order, and clicked “approve.” Then I returned to my seat and went back to our dinner without missing a beat. The whole process took maybe two minutes.

Just a few years ago, this transaction would have required a laptop tethered to the network in a hotel or office, and it would have completely disrupted the dinner.  This pace of change, leveraging mobility solutions, across IT is unprecedented.

Why are so many businesses turning to mobile enterprise apps? According to Gartner, more than 25 percent of enterprises will have an app store by 2017. Mobile apps are making the promise of BYOD a reality. People love their apps and the highly personalized experience they deliver. By bringing their own devices to work, people can enjoy their work more, use the devices they choose, and do their jobs better and faster—from anywhere. According to Cisco’s latest study, the Financial Impact of BYOD, they can also be more innovative and productive.  At Cisco we firmly believe that work is a thing you do, not a place you go.  Read More »

Tags: , , , , , , , ,

Summary: BYOD and Collaboration Don’t Have to be Next National Security Threat

July 9, 2013 at 4:16 pm PST

In a world where people are always on the go, it’s only natural that employees will use their own mobile platforms more often for collaboration.  However, the increase in the Bring Your Own Device (BYOD) trend for collaboration purposes brings about a number of security concerns in the workplace.

There are multiple capabilities that go into delivering an enterprise-class BYOD solution. The recent attention around the National Security Agency (NSA) surveillance leak may have organizations across the globe reevaluating their strategies when it comes to BYOD security, but there are tools to minimize threats, such as: user authentication, network access control, and remote data wipe

We understand the need for an emphasis on security and have developed the tools to minimize the threat when it comes to your organizations’ BYOD strategy. Please take a look at our CTO of Collaboration, Laurent Philonenko’s recent No Jitter article about the many options and factors to consider when planning your BYOD security strategy.

Tags: , , , ,