Cisco Blogs


Cisco Blog > Security

Seven Things to Complete Before Deploying Cisco Identity Services Engine

Connected devices are spreading like kudzu on the Carolina roadside. Cisco Identity Services Engine (ISE) is a great way to manage the devices on your network and with implementing some best practices, I can say you will save time. Below are 7 ideas that will help:

1. Find an Executive Sponsor.

Security policies can now be supported at a network level using ISE. Official IT policies around accessing information based on BYOD were often circumvented. But now with ISE, we’ve been able to implement policies that provide the right access, but can’t be circumvented. This makes it more important than ever that you have executive-level sponsorship. Truth be told, which IT project wouldn’t benefit from the executive backing? My first experience with an executive sponsor was with an excellent CIO who resembled Pope Francis and spoke like a wicked good Bostonian. He tasked me with pursuing business groups and obtaining feedback on IT process changes. The CIO called me his “Man in Havana”. My coworkers lovingly changed it to “Cabana boy” because we made fun of each other at every opportunity. The point is, busy manufacturing and software development directors found time for my questions and follow-up meetings because an executive was driving the effort.

Read More »

Tags: , , , ,

Massive Canadian Pharmacy Spam Campaign

On Tuesday May 28, 2013 at 17:30 UTC a massive pharmaceutical-based spam campaign began, using the Subject: header “Only 24 Hours Left to Shop!”. Cisco witnessed volume rates peaking as high as 8 out of every 10 spam messages being sent. The indiscriminate nature of the attack’s recipients suggests that most anti-spam vendors, including Cisco, will have blocked this attack very quickly.

Pharma Spam Volume Graph

Read More »

Tags: , ,

Cisco Domain Ten: Domain 9: Security and Compliance

Security and Compliance is the next domain in our Cisco Domain TenSM model that I will cover, following on from my previous post on Applications.  And following on from my previous posts around Cisco Domain Ten, I’ll give you a brief overview of the questions that come up when we discuss data center security and compliance challenges with customers as we help them transform data centers, migrate applications to Cisco UCS, and adopt cloud computing solutions and architectures.  Security has and continues to be a major focus area in Cisco, so it was great to see Cisco come top in the recent survey by Infonetics Research, “Data Center Security Strategies and Vendor Leadership: North American Enterprise Survey, March 2013”!

 

Domain 9: Security and Compliance

Domain 9: Security and Compliance

Security and compliance are indeed exciting areas, indeed security is often highlighted in surveys – including my own survey of Cisco customers a few years back now – as the #1 issue impacting customer adoption of cloud computing.  So what are come of the issues, challenges and considerations should be on your mind with respect to security and compliance in the data center and cloud?

Read More »

Tags: , , , ,

Interop, Vegas…Rear View Mirror

My two favorite days for a Vegas conference: arriving and leaving. Everything in between is a foot numbing, sleepless blur. But we had a great time! It was cool to be on stage hanging with our Cisco friends and getting to re-unite with old competitors, many of which are former peers.

We did not have as many videos as usual for a trip like this since we were doing the ‘stand and deliver’ thing. The topics were good however.

Jacob Rapp on Unified Access trends in the Data Center

Mark Royle catching us up on Unified Call Control

Bill and Ziad: Global Security Intelligence

This was a two-fer that Jimmy Ray and I tag teamed…I feel the urge to call it ‘Unified’ something just to complete my corporate marketing bingo card….but I did giggle a bit knowing that we stood in front of the ‘MOC SOC’ (Mock Security Operations Center). I am not even sure why I find that funny.

Please check out the Success Factors video we did with Marlowe Fenne. . I blogged about Unified Access (BINGO!) yesterday.

My work here is done.

Thanks for watching!

Robb


Twitter: @TechWiseTV, @robbboyd, @jimmyray_purser

TechWiseTV on YouTube

Keep up behind the scenes on our facebook fan page


Tags: , , , , , , , ,

Have You Registered for Centralize Policy, Control and Enforcement May 15th?

Activate the IT Transformation with Unified Access: Part 4 –  Centralized Policy, Control, and Enforcement 

Wednesday, May 15, 2013  10am-11am PDT     |       Register Now

Don’t miss the next in line of our five-part Unified Access Webinar Series  on May 15th to hear how organizations in education and healthcare rely on Cisco Identity Services Engine (ISE) to provide the identity enforcement and secure access control that allow employees, contractors, students, faculty, and guests (choose the user) to use their own devices on the network. Read More »

Tags: , , , , , , , , , , , , , , , , , , , , , , , ,