Last post I covered some of the basics around VM networking. But, as we all know, there is more to networking than just packet transport. One of the biggest challenges with VM networking is security policy enforcement. The fundamental nature of server virtualization introduces a new set of challenges for both network and security admin to ensure proper compliance with infosec policy because of things like VM mobility, VM sprawl and potential loss of transparency. With the introduction of the Nexus 1000V we gave network and security admins many of the security tools they were already familiar with with physical Cisco switches--this should not be a surprise, since the Nexus 1000V is a full NX-OS switch. Last summer, we built upon this functionality with the Virtual Security Gateway. This zone based firewall was specifically desinged to meet the unique challenges of VM environments. Click on the pic for a quick 3 minute tour of the VSG
Annalisa Giardina of the Cisco Marketing Team working the booth at RSA 2011
RSA 2011 was a big show for Cisco. We had a 30x30 booth with an in-booth theater, eight demo pods, speakers on several panels, and a keynote. Including speakers, the install and dismantle crew, and all of the booth staffers, we had a crew of around 100 people at the show. Demos included firewalls, virtualization, mobility, web, and security services. With the passing of Cisco Security Monitoring, Analysis, and Response System (MARS), a partner’s SIEM ecosystem display was of note, as were demonstrations of Cisco TrustSec, intrusion prevention, and Cisco Virtualization Experience Infrastructure (VXI). We also demonstrated Cisco AnyConnect running on an iPad, illustrating how Cisco can meet the needs of organizations grappling with the demands of the consumerization of IT and the security concerns that employee liable devices bring.
2010 saw a lot of attention, coverage, and interest building up around the private cloud. IDC’s “IT Cloud Services Survey” conducted in the second quarter of 2010 showed that “those who find private clouds more (and much more) appealing than public clouds outnumbered those who find private clouds less (or much less) appealing by over 5 to 1.”
A UTM solution provides comprehensive protection for your small business network and data
In many sport games, the best defense is a good offense. In order to protect yourself from threats, you need to proactively build your team so that the opposing team never gets a chance to score.
This idea of proactive protection—of good offense—applies to your small business. Any network is vulnerable to hackers, viruses, worms, and other threats. You need to build your network security “team” to protect against these threats and reduce the potential loss of company data, revenues, and employee productivity.
A recent survey by Trend Micro found that small businesses are 23 percent less likely to have systems in place to prevent data leaks than larger companies. What are you doing to protect your data?
Although not a rule, IT and Control at many manufacturers have an arms-length, if not more distant, relationship. They have different priorities, expertise and cultures. But the reality is that the converged plant, based upon standard networking throughout the plant, requires them to work together to achieve the bucket of gold benefits awaiting their company. Our partnership with Rockwell Automation in many ways is a result of this need at many of our customers. They need us to work closer so that they can focus on a single technology and solution and rely on a “converged” support model as they bring their plants into the standard networking world interconnected to the rest of the enterprise. To this end our companies have been working together for more than five years.
Gregory Wilcox, Rockwell Automation, on IT/Control cultural convergence
Listen to my colleague at Rockwell Automation, Gregory Wilcox -- Business Development Manager, describe the culture convergence that needs to occur -- critical to the overall convergence. We have done a lot of the leg work to make this convergence happen.