“Change is inevitable—except from a vending machine.”
In the spirit of Robert C. Gallagher’s famous quote—and in our quest to never be a vending machine—we’ve rolled out several updates to Cisco’s Security Intelligence Operations (SIO) Portal which I trust you will find useful. Thanks to your feedback, we continue to evolve the Portal to ensure that relevant security content is where you need it, when you need it. Providing timely information to our customers requires not only a global team of Cisco security experts to pipeline the latest information, but a complementary team who ensures that the most significant issues are also the most visible. In fact, that’s the most exciting change we made: a new ‘Security Highlights’ tab which allows a cross-functional group, led by our content managers, to call out the most important issues to our customers. That way, instead of looking at IntelliShield alerts, Cisco Security Notices, or Event Responses individually when time is scarce, this new tab gives you an at-a-glance view of Cisco security content our experts feel is most pressing given all of the events into which we have a view.
Last week at the RSA Conference in San Francisco, I had the pleasure of speaking to thousands of security professionals about the opportunities and risks associated with using Software Defined Networking (SDN) for security, which will be the underlying fabric of our next generation data centers and networks. SDN-enabled security will provide a better way to secure our most valuable applications, users and data, now and in the future.
Each vendor has a different definition of how the network is changing, and there are many different terms being used, such as software defined data center and software defined storage. Cisco calls this Application Centric Networking, for example, because we are introducing programmable APIs with a focus on distributed control plane intelligence so that applications can get value directly from the network.
It’s obvious why the networking industry is embracing SDN: lower operational costs and the ability to deploy applications and network services in a quicker, more scalable manner. Cloud bursting, which is about flexible compute in the cloud, is another SDN benefit that gives us the ability for applications to interact directly with the network in ways that do not happen today. For example, applications will be able to query the network for location of users to manage Quality of Service and deliver highly targeted content.
So why should the security industry care about SDN? As the threat landscape evolves, the opportunity is to make Security a key application for SDN. We can use SDN to build a Network-based Threat Defense System. I see three key elements to this system:
The number of mobile-connected devices has broken the 1 billion mark. That’s not too surprising, given that as we grow more reliant on our devices and mobility, we also become more reliant on the Internet to get things done, take care of customers, and expand our businesses. In fact, we see a future that is defined by what we call the Internet of Everything (IoE), bringing together people, processes, data, and things to make networked connections more relevant and valuable than ever before. Yet Cisco estimates that about 99.4 percent of what could be connected by the Internet is currently unconnected. That’s pretty staggering. Imagine how even a fraction of that could affect your business—by connecting employees when they’re mobile and connecting customers and partners to keep business processes and sales in progress.
Cisco’s latest offerings are designed to capitalize on connectivity, helping to fuel small business success and pave the way for future growth.
Lief Keopsel recently discussed how the growing mobile population calls for a new approach. Cisco’s expanding small business portfolio helps customers find the right technology to meet their evolving needs—such as increasing overall productivity, bolstering responsiveness, and beating the competition. But we haven’t stopped there. We’ve recently added additional routers and wireless access points.
Ultimately, we’re developing a portfolio that helps small businesses perform to their maximum potential through offerings that span security, connectivity, and collaboration.
Security Is a Competitive Advantage Through all this, whether you’re increasing productivity or enabling collaboration, you really have to keep security at the forefront. It’s what gives you the edge. If you missed the recent blog post featuring David Lawrence from Smart Technology Enablers talking about the Cisco ISA500 Series, please listen in. David describes how the Cisco ISA500 Series helps customers safeguard against outside threats while allowing employees to securely access information remotely.
Connectivity Is Key to Productivity Check out how our newly launched products deliver greater capabilities with built-in intelligence to provide more options for getting things done and creating a more customer-centric business model, regardless of location.
Collaboration Improves Business Effectiveness Bringing together people is a key part of our value proposition. We’re helping small businesses respond to customers more quickly and cultivate stronger customer engagement and loyalty. All while lowering the cost of doing business.
We understand that making the right technology decision is critical. And to that point, we’re proud of the recognition we’ve received from Miercom. Linda Beaton’s post on February 8 highlights a recent study by Miercom. This report favorably compared the Cisco SF500, SG500, and SG500X switches with similar products offered by HP, D-Link, and Netgear.
To learn more about the Cisco Small Business products referenced here, please visit our website. Or to learn more about our Cisco Services, click here. If you’re a Cisco partner, check out our Partner Launch page to help seize new market opportunities and add value to your customers.
How are these changes affecting you? And, how can we help to strengthen our partnership?
Security and its integration with social media continues to be a topic of conversation amongst my colleagues in Security Intelligence Operations. We observe how “being connected” has become an integral part of many lives around the world: each voice has an opportunity to be heard, provided those voices are given unfettered access to the Internet. It’s somewhat like an electronic ecosystem of democracy. And like a democracy, the results of those voices participating in a global conversation are not always well understood or appreciated. I believe that this is due in part to those conversations being filtered through two unavoidable lenses: national borders and culture. Jean Gordon Kocienda provides an excellent analysis on the challenges faced by nation states. In this post, I’d like to offer up some thoughts on the cultural implications of the global conversations taking place in social media.
We’ve invested considerable time, effort, and money in the effort to make Cisco products robust enough for deployment as Trustworthy Systems, either in their own right or integrated into a complete solution. At its essence, attaining trustworthiness is a matter of discipline—a series of conscious actions to build products in the right way, certify their conformity to prevailing industry and customer-required standards, and keep a careful watch on the integrity of the product supply chain, from initial product concept through their integration and operation over a solution lifecycle. But the most important attribute of a trustworthy system is vendor transparency. I define this as a customer’s ability to ask a vendor any question and to receive a complete, honest answer in return.
I have more to say on this subject in a video blog. I also invite you to view the Trustworthy Systems page on Cisco.com and download the newly published Cisco Trustworthy Systems White Paper.