Cisco Blogs


Cisco Blog > Security

Leveraging the Network as a Security Sensor and Policy Enforcer

The topic of cybersecurity has become so ubiquitous that it’s almost a daily occurrence to read or hear about security breaches in the news. Cisco understands this paradigm shift within the nature of computing, that the Digital Economy and the Internet of Everything now requires what we are calling Security Everywhere. Security has to span the extended network in order to protect against an ever growing array of attack vectors. Scott Harrell, Vice President Product Management has written a more detailed blog about this specific topic here .

The key point to note about Security Everywhere is that organizations are under unrelenting attack and breaches are happening every day. Attackers have also created sophisticated malware that can be launched into the network, gather information to intelligently understand exactly what, when and how to attack and then launch an extremely surgical and devastating attack against the network. Our Cisco 2015 Annual Security Report is an excellent resource for detailed research about the nature and frequency of attacks against the enterprise.

Read More »

Tags: , , ,

ISE Ecosystem Expands to Drive Deeper Visibility and Control with Cisco Identity Services Engine

In one of my previous posts, I noted how Network Access Control (NAC) platforms have started evolving into more visibility-focused and context-aware platforms in the face of major business trends such as enterprise mobility, the migration of resources to the cloud, and the ubiquitous Internet of Everything. Consequently, “new NAC” technology has quietly transformed from a complicated set of controls – outdated in a more mobile world – into a powerful business enabler for enterprises.

The Cisco Visual Networking Index (VNI) forecasts that over fifty billion new connected devices will hit networks by the year 2020. With this massive proliferation of network-enabled devices firmly in mind, I am proud to announce that the latest version of the market-leading Cisco Identity Services Engine (ISE) is now available. Cisco Identity Services Engine builds upon the solid foundation of our last release to round out the current platform by focusing on expanding the ISE partner ecosystem with new, exciting categories for context-aware security as well as advancing endpoint security capabilities.

Read More »

Tags: , ,

Implementing a Hot Threat Dashboard

Logjam, Freak, Shellshock, BEAST, POODLE, Heartbleed. Each new vulnerability requires a fire-drill to see if you’re vulnerable, if you have protective mechanisms, and to verify that your organization can detect attacks against your corporate network. On top of that, you may also receive bulletins from threat intelligence partners, law enforcement, and other warnings that require heightened vigilance and the ability to detect new attacks.

Hot threats board posted in each SOC.

Hot threats board posted in each SOC

Read More »

Tags: , , , ,

Trust and Transparency

In our increasingly interconnected world, the Internet of Everything is making trust a critical element of how people use network-connected devices to work, play, live, and learn. The relentless rise in information security breaches underscores the deep need for enterprises to trust that their systems, data, business partners, customers, and citizens are safe.” – John N. Stewart, SVP and Chief Security and Trust Officer at Cisco

Trust and security is more important than ever before throughout the industry. Why aren’t customers explicitly demanding it be in all their IT systems? Why aren’t they demanding software developed with processes and technologies that drive security into all aspects of IT systems they buy? Why aren’t they demanding supply chain security and strong data protection? In short, why aren’t they demanding IT vendors produce more robust and secure solutions? Read More »

Tags: , , ,

Meeting the demand for Cloud technology skills

What makes the cloud such an attractive option for enterprises? The cloud empowers IT to act as a broker of business critical IT services. It helps the organization become a more proactive player that can aggregate, integrate, and customize the delivery of cloud services to meet specific business needs. Instead of working in a technology vacuum or owning the entire IT value chain, IT can make build or buy decisions in the context of IT services sourcing recommendations. Meet critical business objectives

Businesses in every industry are rapidly embracing the cloud. They want the agility, security, and performance that cloud technology delivers. And they want the flexibility to deploy their choice of workloads securely to the cloud. This growing demand for cloud services is creating new opportunities for cloud providers and driving new job roles and responsibilities.

Read More »

Tags: , , , , , , , , ,