Cisco Blogs


Cisco Blog > Analyst Relations

The Economics of Cloud Computing

Are you interested in how enterprises and service providers are making and saving money via cloud? Last week, Cisco hosted a live webcast featuring IT executives from CSC, Sprint, and Educational Testing Service (ETS) who discussed the economic benefits of cloud computing for their businesses and their customers.

This session provided real-world perspectives into the cloud adoption of major enterprises and service providers, as cloud computing continues to transform businesses through improved agility, better economics, enhanced security and a dynamic, assured experience.  The executives discussed the economic benefits derived from cloud business models and shared examples of how cloud computing is changing their industries.

Take a moment to hear how these businesses are revolutionizing their models through cloud adoption.

Tags: , , ,

Have You Hacked Yourself Lately?

Security professionals are planners by nature. Our industry expects planning, legal and standards compliance requires it, and we drive ourselves toward it. However, the best plans fall out of date quickly. And as the adage commonly paraphrased as “no plan survives contact with the enemy” states, even properly maintained, up-to-date, and well-thought-out plans may fall apart during an incident.

What’s the remedy? We certainly shouldn’t throw out our plans. Instead, we should test and adjust our plans so that when the real enemy shows up, we might have a plan that survives, at least from a broad perspective. In short: security professional, hack thyself!
Read More »

Tags: ,

What is it Like to be a Cisco Security Analyst?

Security events, such as vulnerabilities and threats, that are detected globally continue to grow and evolve in scale, impact, diversity, and complexity. Compounded with this is the other side of the coin, the unreported or undetected events waiting in the wings, hovering below the radar in a stealthy state. With all of the security technologies at our disposal, are they sufficient enough to provide effective protection? Well, it is certainly a good start when applied correctly. At a summary level, Cisco’s Security Intelligence Operations (SIO) approach to this challenge was covered in the Network World feature article, “Inside Cisco Security Intelligence Operations.” However, one of the core human elements, which I will introduce, that deserves closer attention is the role of security analyst. In addition, this article provides those of you with career interests some additional insight into working in the IT security field.

Read More »

Tags: , , , , , , , , ,

Cisco Event: Hannover Messe Industry Event 23-27 April 2012, Germany

April 12, 2012 at 1:09 pm PST

Today, industrial networks are being impacted by a number of trends – convergence of industrial and enterprise networks, growing inter-connectivity across industrial equipment, and heightened security concerns. Come visit Cisco in Hall 8, Stand 26 at Hannover Messe to see what we have to offer for manufacturing,  mining, transportation, and oil, gas and energy companies. Read More »

Tags: , , , , , , , , ,

A better understanding of BYOD without Compromise

As anyone who attended Cisco’s recent “BYOD without Compromise” Webinar noticed, the BYOD phenomenon is changing company priorities, and is bringing up a lot of questions about the solutions available to scale, secure and operate a successful  network. Replay the Webinar

Join us for our upcoming #ciscowifi TweetChat during which you’ll be able to engage in a real time BYOD discussion on Twitter with Cisco Technical Experts. What is a TweetChat?

April 17, 10-11am PST: TweetChat Topic: BYOD and Cisco ISE – use #ciscowifi.

First, I’ve put together just a few details based on the most popular questions posed during the recent webinar about Cisco’s approach to BYOD. And at the end of this post, I’ve also listed upcoming events for even more in depth technical discussions on a variety of BYOD topics.

Enhanced Identity Services Engine (ISE):

Cisco ISE is a context-aware, identity-based platform that gathers real-time information from the network, users, and devices. This enables IT to offer mobile business freedom with policy for when, where and how users may access the network..

ISE integrates with Prime Network Control System and supports BYOD with any 11n Wireless Access Point (even if you’re running your network in FlexConnect -- aka HREAP- mode)

In addition to managing on-boarding, Cisco ISE has full guest lifecycle management.  It also allows IT to deny access to devices for a variety of reasons; such as who you are, what device it is, if you are running the latest OS or anti-malware or how you are accessing  the network..

Posture -- Posture is the component of ISE platform responsible for enforcement of corporate security policies governing access to its enterprise network.  For example, for non-corp owned devices, you can decide what is the minimal requirements based on the device type/OS etc. Setting this up ahead of time will avoid security issues with non-supported devices

ISE also provides real-time endpoint scans based on policy to gain more relevant insight. These automated features result in a better user experience and more secure devices.  Cisco ISE uniquely leverages the network. It is essentially the brains for secure access and provides the policy to the network infrastructure (it is woven into the switches, routers, etc.)

New Prime Infrastructure:

Prime is a single package that provides complete infrastructure – wired and wireless, and mobility lifecycle management– configuration, monitoring, troubleshooting, remediation, and reporting.  This solution includes:  Prime Network Control System (NCS) for converged wired/wireless monitoring and troubleshooting, plus wireless lifecycle management, with new branch network management functionality; and Prime LAN Management Solution, for wired lifecycle management and Borderless Network services management.

Mobile Device Management (MDM):

To protect data on mobile devices and ensure compliance, Cisco is integrating with multiple Mobile Device Management vendors.  This gives IT greater visibility into the endpoint as well control over endpoint access based on the compliance of these devices to company policy (such as requiring pin lock or disallowing jailbroken devices), and the ability to do remote data wipes on lost or stolen mobile devices. If you don’t have a supported vendor, we will not be able to get as rich detail about the status of that device, however, you still get the full wired/wireless policy.

Current MDM third party vendors: Zenprise, Good, Airwatch, MobileIron

Device Operating Systems:

Wondering about which OS is preferred on your mobile device?

Cisco offers broad mobile device OS support in Cisco AnyConnect VPN software, including IOS, Android, and Windows Mobile.

Virtualization:

When it comes to virtualization, Cisco has created the Cisco Virtualization Experience Infrastructure (VXI), an end-to-end systems approach that delivers the next generation virtual workspace by unifying virtual desktops, voice, and video. Check out the link for more information on VXI, VXI with Citrix, VXI with VMware, Virtualization Services and validated Design Guides http://www.cisco.com/web/solutions/trends/virtualization/index.html

This is just a drop in the bucket. To get even more information on taking your organization beyond BYOD, don’t miss our upcoming technical deep dive webinars and in person events that speak directly to managing your growing network while you’re doing your best with limited resources.  You can also check out Cisco’s BYOD solution, Prime and ISE:

Upcoming Events

Tags: , , , , , ,