Cisco’s leadership in the emerging market for the Internet of Everything (IoE), Smart Cities and Big Data/analytics rests on our ability to harness the technologies and business models of our global partner ecosystem – especially those of early-stage startups who are building truly disruptive capabilities for the future. I previously shared my vision of Cisco Entrepreneurs in Residence (Cisco EIR) pioneering new ways for Cisco, already a successful innovator in the global IT space, to collaborate with innovative entrepreneurs in shaping the emerging technologies that will redefine our industry and change our lives. Since then, six startups joined our first incubation track last spring in Silicon Valley and began collaborating closely with Cisco business and engineering groups to co-create solutions for Cisco’s customers and partners. I shared various updates in the following months about the EIR program’s exciting milestones adding co-incubation partners across the US, taking the program to Europe and selecting the first startups to join our program there.
Today, I am pleased to share two more milestones marking the continued success of our open innovation strategy at Cisco, with Cisco EIR helping to lead the way.
Cisco EIR Demo Day 2014
On December 8th, 2014, we celebrated the successes of the startups in our inaugural cohort with our first Cisco EIR Demo Day (photos) a gathering of over 100 attendees, including Cisco business and technology leaders, VCs, partners and others from the Silicon Valley startup community.
Read More »
Tags: analytics, Big Data, chicago, Cisco, Cisco Entrepreneurs in Residence, cisco live, ciscoeir, Edzard Overbeek, EMEAR, entrepreneurs, entrepreneurship, Europe, EvoNexus, Fresno, innovation, Internet of Everything, internet of things, IoE, IoT, Mala Anand, pioneers, San Diego, security, Silicon Valley, Smart Cities, Smart City, startups, Vienna
This post was authored by Fred Concklin, William Largent, Martin Rehak, Michal Svoboda, and Veronica Valeros.
During an average day of surfing the web via computer, smartphones, and tablets, we are constantly deluged by advertising. Total annual Internet advertising revenue will approach $200bn by the year 2018, making it an extremely lucrative business and in turn an attractive attack vector known as malvertising.
Read More »
Tags: broswer exploitation, CTA, malvertising, security, Talos, Threat Research
Cisco recently published their Annual Security Report (ASR) for 2015 and there was quite a bit of interesting information on what happened in 2014, but also trends for 2015. We saw the rise in the number of highly publicized attacks in 2014 and the fact that C-Level Executives are under a lot of pressure to improve the security of their networks and protect sensitive client data. While attackers have always targeted IT users, in 2015 the trend is shifting where the primary target is to take advantage of user behaviors to breach the network. This last point is important because once the user has been compromised or their credentials have been lifted, the attacker then has access to anything important that is connected. The Cisco 2015 ASR shows that only 43% of organizations leverage identity administration and provisioning to properly secure their networks and data. This means that over half of organizations don’t know who is accessing their networks, where they’re going or coming from, or what they’re using and if it is even authorized based on business policy. As we all know, once someone unauthorized gets inside it can be challenging to track down the incursion and negate the threat.
Read More »
Tags: 2015 annual security report, bring your own device, byod, internet of things, IoT, NAC, security
Microsoft’s Patch Tuesday for February 2015 has arrived. This month’s round of security updates is large with Microsoft releasing 9 bulletins addressing 56 CVEs. 3 of the bulletins are rated critical and address vulnerabilities within Internet Explorer, Windows, and Group Policy. The remaining 6 bulletins are rated important and address vulnerabilities in Office, Windows, Group Policy, and System Center Manager.
Read More »
Tags: 0-day, coverage, ms tuesday, rules, security, Talos
This week, Cisco and NBA celebrate how the Internet of Everything (IoE) powers the fan experience. Thanks to advancements in technology, we’re changing courtside connectivity between the game, the player and the fan.
Like any NBA team, an IT infrastructure begins with a starting lineup of technologies that enable a winning Internet of Everything strategy. In excitement for the NBA All-Star game, Cisco picked its Starting Five for today’s IT environment. Check out our picks below and share your favorites on Twitter, Instagram or Facebook using the tag #ConnectedFan.
A point guard is fast and agile, and responds quickly to pressing demands brought about by unseen difficulties. Any coach can appreciate the “automatic” abilities of a veteran point guard who can sense problems before they happen and eliminate the headaches to improve the overall team’s performance. Like any successful point guard, IoE can help accelerate your organization’s ability to compete in today’s dynamic market. Through the enablement of people, process, data and things, IoE is estimated to drive a 21% increase in corporate profits.
The shooting guard is a high profile position that drives results. The efficient creation, deployment and management of applications in today’s environment greatly affect the bottom line. ACI has the potential to drive high-visibility, high-impact results for the organization that no other technology can make.
Quick and lean, the small forward is the most versatile player who just gets the job done. Like Fast IT, the small forward is in the trenches and works with the team to accomplish bigger goals. Fast IT is Cisco’s operational model for the Internet of Everything, providing organizations with the ability to provide the connectivity that allows IoE to provide a real impact on businesses that didn’t exist just a few years ago.
The power forward is the team’s most powerful traveler, known for mid-range jump shots and the ability to fulfill multiple roles in your lineup. With today’s mobile workforce and the continued proliferation of connected devices, your mobility strategy must be equally expansive and adaptable to effectively meet today’s business demands on your network.
This is your bigman — the tallest player in your lineup who is the anchor for your team’s defense. With a Fast IT model, security enables you to assess, react to, and guard against threats.
Tags: FastIT, Internet of Everything, Joseph Bradley, mobility, security