Cisco Blogs


Cisco Blog > Security

The Three Pillars to Cisco’s Secure Data Center Strategy: Part 3 Visibility

In this last part of this series I will discuss the top customer priority of visibility.  Cisco offers customers the ability to gain insight into what’s happening in their network and, at the same time, maintain compliance and business operations.

But before we dive into that let’s do a recap of part two of our series on Cisco’s Secure Data Center Strategy on threat defense. In summary, Cisco understands that to prevent threats both internally and externally it’s not a permit or deny of data, but rather that data needs deeper inspection. Cisco offers two leading platforms that work with the ASA 5585-X Series Adaptive Security Appliance to protect the data center and they are the new IPS 4500 Series Sensor platform for high data rate environments and the ASA CX Context Aware Security for application control.  To learn more go to part 2 here.

As customers move from the physical to virtual to cloud data centers, a challenge heard over is over is that they desire to maintain their compliance, security, and policies across these varying instantiations of their data center. In other words, they want to same controls in the physical world present in the virtual – one policy, one set of security capabilities.  This will maintain compliance, overall security and ease business operations.

By offering better visibility into users, their devices, applications and access controls this not only helps with maintaining compliance but also deal with the threat defense requirements in our overall data center.  Cisco’s visibility tools gives our customers the insight they need to make decisions about who gets access to what kinds of information, where segmentation is needed, what are the boundaries in your data center, whether these boundaries are physical or virtual and the ability to do the right level of policy orchestration to maintain compliance and the overall security posture.  These tools have been grouped into three key areas: management and reporting, insights, and policy orchestration.

Read More »

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , ,

TechWiseTV 120 Defending the Data Center

September 20, 2012 at 10:30 am PST

We had to dig further, past our initial meetings internally and determine what would make this particular story unique from previous ones we have told this year.  As it turns out, we had plenty of material to share but three really good shows done earlier, now provide great context for appreciating the innovation we talk about in this one.

Check out: Fundamentals of High End FirewallsFundamentals of Intrusion Prevention and (TechWiseTV 115) Firewall Reinvention with the ASA-CX

So topically, Security in the Data Center is an easy hit of course.  It almost sounds like an Oxymoron as many are convinced it is some kind of insurmountable obstacle. Nothing could be further from the truth.   It seems to top many lists.  [Watch 'Defending the Data Center' Right Now.]

As Cisco broadens the tool set with new models and deployment options, we broke this one down along party lines:

Read More »

Tags: , , , , , , , ,

The September 2012 Cisco Security Advisory Bundle is Coming Soon!

As previously discussed here on the Cisco Security blog, the Cisco Product Security Incident Response Team (PSIRT) follows a twice-per-year schedule for disclosing high-severity security vulnerabilities in Cisco IOS Software. The next Cisco IOS Software Security Advisory Bundle will be released on the 26th of September at 16:00 GMT. Our Security Vulnerability Policy describes the schedule best:

In direct response to customer feedback, Cisco releases bundles of Cisco IOS Software Security Advisories on the fourth Wednesday 16:00 GMT of the month in March and September of each calendar year. This schedule applies to the disclosure of Cisco IOS Software vulnerabilities and does not apply to the disclosure of vulnerabilities in other Cisco products.

We offer several convenient and timely ways to learn of new
Cisco Security Advisories and Cisco Security Advisory Bundles.

Read More »

Tags: , , , , ,

The Three Pillars to Cisco’s Secure Data Center Strategy: Part 2 Threat Defense

In part one of our series on Cisco’s Secure Data Center Strategy, we did a deeper dive on segmentation.  As a refresh, segmentation can be broke into three key areas. The first, the need to create boundaries is caused because perimeters are beginning to dissolve and many environments are no longer trusted forcing us to segment compute resources, the network and virtualized attributes and environments. Along with segmenting physical components, policies must be segmented by function, device, and organizational division. Lastly, segmenting access control around networks and resources whether they are compute, network, or applications offers a higher level of granularity and control. This includes role-based access and context based access.  Ensuring policy transition across the boundaries is of primary concern. To learn more on segmentation go here.

Today we will dive deeper into Cisco’s security value-add of threat defense.

Technology trends such as cloud computing, proliferation of personal devices, and collaboration are enabling more efficient business practices, but they are also putting a strain on the data center and adding new security risks.  As technology becomes more sophisticated, so are targeted attacks, and these security breaches, as a result, are far more costly.  The next figure is from Information Weeks 2012 Strategic Security Survey and illustrates top security breaches over the previous year.

Read More »

Tags: , , , , , , , , , , , , , , , , , , ,

Managing Security Content That Matters

What might interest you to spend time at a website such as Cisco’s Security Intelligence Operations (SIO) web portal? You might be compelled because of the relevant security content made available to you that matters most. Directly linked to that experiential perspective are the behind-the-scenes efforts that are related to the publishing and presentation of security content, which is a dynamic undertaking because the Internet never sleeps and the next cyber-security event looms just around the corner. Security practitioners, and non-practitioners alike, reap the benefits from the security content that the Cisco SIO content managers orchestrate for the SIO portal. This article provides insights into how they contribute to the publishing of trusted, consistent, and predictable content for you, our customers, on a daily basis throughout the year.

Managing security content is significant in several respects to SIO, where there is an array of options to apply and reap maximum benefit from content within the key security tenets: confidentiality, integrity, and availability. At its core, SIO’s security content transcends diverse communications mediums and is woven into the methods related to how we consume and interact with it. Cisco has a team of dedicated content managers chartered with meeting the demands and challenges of delivering timely, credible, and actionable security intelligence through the editorial and web publishing services that they provide within SIO.

The Security Content Manager needs to be mindful of the content providers and publishing platforms covered while aggregating and distilling security information for use by a global audience over multiple communications channels within the context of their use cases. This approach is integral to facilitating the degree and impact of the security content’s effectiveness and utility.

Read More »

Tags: , ,