Last week, Cisco CEO John Chambers attended the World Economic Forum in Davos, Switzerland. A major theme of the week was security and the implications of the Internet of Everything…the topic which John focused on in his contributed article to the WEF blog, Agenda. You can read the full article here.
In the article he stated:
WEF graphic – John Chambers on Security 2015
Additionally, last week, Cisco issued our Annual Security Report which includes data about the number of breaches, attacks and how to mitigate these increasing threats. Cisco SVP and Chief Security Officer John Stewart blogged on this report here. A key call to action of the report is for corporate boards to take a more active role and focus on security as they help run their companies. He also talked to BloombergWest’s Cory Johnson. You can view that interview here.
In Davos, John Chambers talked to a few reporters about the implications of more things being connected…overall, of course, the impact will be very positive. As we move from 14B connected devices to 50B by 2020, John argues that each of those end points cannot be trusted to be secure, therefore you need to focus on security from an architectural approach…something, of course, where the network has a distinct advantage.
See John’s interview with USAToday Editor-in-Chief Dave Callaway.
See John’s interview with New York Times reporter David Gelles.
And, see here, for how many devices are connected to the Internet. Right. Now.
Tags: Davos, hacking, Internet of Everything, IoE, IoT, john chambers, security, WEF
As the Cisco 2015 Annual Security Report shows, current security approaches aren’t sufficient. Attackers are shifting methods and becoming more sophisticated in their approaches, users are unwittingly complicit enablers, and defenders struggle to keep up with all of these things. It is time for defenders to take a different approach to security that not only outwits attackers but also makes security a competitive advantage that enables business growth.
By taking a threat-centric and operational approach to security, organizations can reduce complexity and fragmentation, while providing superior visibility, continuous control, and advanced threat protection across the extended network and the entire attack continuum.
Using Cisco technology, this approach is enabled by broad visibility for superior intelligence across the extended network, where all the solutions a customer deploys communicate with each other. Organizations using siloed solutions will have holes in their security. Siloed solutions do not provide full protection since they do not communicate with one another, thus leaving security gaps and the inability to create actionable intelligence.
Cisco can provide a holistic solution to this problem by reducing the attack surface and extending protection across the network – before, during and after attacks.
Read More »
Tags: 2015 annual security report, Big Data, byod, Identity Services Engine, ISE, Managed Threat Defense, security
In many parts of the world there was a holiday period and celebration of the New Year, and it reminds me that the world has holiday periods all year round. What happens to your remote access demands during holidays? One would think that being on holiday means no one needs access to corporate resources, correct? Sometimes I really wish that were true. Sadly, that has not always been the case even for me. As an example or two, maybe you can relate to the people below or know someone like this:
Read More »
Tags: holiday, mobility, remote access, security, travel
Each week, we’ll highlight the most important Cisco Partner Ecosystem news and stories, as well as point you to important, Cisco-related partner content you may have missed along the way. Here’s what you might have missed this week:
Off the Top
Great blog this week from Raja Sundaram. He posted Delivering Business Solutions with Connected Analytics and it’s a good look at how Cisco is using its strength in hardware, software, services and partnering to provide powerful analytic solutions.
If you’re interested in how Cisco can partner with you to ensure your data analytics strategy is in place, be sure to check out Raja’s blog as it can provide insight on how:
- Partners will be able to tap into a high revenue stream as IT services spend, driven by big data, reaches $44B
- Big data services opportunities supersede hardware and software opportunities, allowing partners to put a premium on these services
- Partners will be able to wrap business intelligence, analytics, and data management solutions with their capabilities to deliver value-added services that differentiate their practice
Take a look and let us know what else we can relay to you around data analytics. Read More »
Tags: Cisco, data analytics, mobility, partner, raja sundaram, security, traffic jam, Weekly Rewind
By Kevin Bloch, Cisco Chief Technology Officer, Australia and New Zealand
One of the best parts about my job is that I get to spend a lot of time listening to some very smart people, both internally within Cisco and externally. As we touch so many parts of the global technology industry and market, it puts me in a fantastic position to see what’s coming down the track. So, each year around this time, I take the opportunity to offer some predictions for the year ahead (which, incidentally, is Cisco’s 30th birthday).
It will probably come as no surprise that the biggest theme you’ll hear about this year is digital transformation, which is essentially underpinned by the Internet of Everything (IoE). In the next twelve months, enterprises will spend more than $40 billion globally, designing, implementing and operating the Internet of Things (IoT). Already thirty-eight percent of technology spend is outside of IT.
Read the full Top 10 ICT Trends in 2015 blog and feel free to provide any feedback.
Tags: cloud, Hybrid Cloud, IoE, IoT, mobile, NFV, SDN, security, software, video, wifi