Cisco Blogs

Cisco Blog > Enterprise Networks

How does Cisco Backbone Switching help address BYOD, Mobility and Security Needs?

Cisco will host a live backbone switching webcast on Wed Dec 4, 2013 to discuss BYOD, mobility, security and how Cisco backbone switching addresses these customer needs. This is the second webcast in the Cisco switching webcast series. You can view the first one, Cisco access switching webcast, at any time as it is now an on-demand video.

This backbone switching webcast comes at a critical time, as BYOD and mobility are creating major impact to the workplace.  According to a recent study on BYOD and mobility,

  • 75% of employees think that the IT department should help secure personal devices used at work;
  • 63% of IT pros say the biggest network issue will be the increased bandwidth requirements;
  • 39% of them say that network latency is a problem because of mobile devices;
  • And 39% of them have seen serious issues tied to network performance as a result.

Read More »

Tags: , , , , , , ,

Summary: Government Agencies and the Future of Mobility

Today’s law enforcement and government agencies are leveraging mobility to enable efficiency and ensure greater safety and security for the public these agencies serve.

In recent years, law enforcement agencies have turned to mobile technology to enhance wireless networks to deliver mission critical information. Other agencies have turned to software to help analyze citizen-driven information on mobile devices and crime in real-time.

IT decision makers in the public sector will face several challenges as they look for solutions in this growing mobile landscape that will help those in the line of duty. With that in mind it’s important for those decision makers to continue to support the case for innovative mobility solutions.

Read the full article:  Government Agencies and the Future of Mobility

Tags: , , , , ,

Securing Critical Internet Infrastructure: a RPKI case study in Ecuador

Securing critical internet infrastructure is an ongoing challenge for operators that require collaboration across administrative boundaries. Last September, something exceptional happened in the small South American country of Ecuador: the entire local network operation community got together to be pioneers in securing the local Internet infrastructure by registering its networks in the RPKI system and implementing secure origin AS validation. Please visit my original blog post over on the Cisco Perspectives Blog to read more!


Tags: , , , ,

Cisco Updates Its Next-Generation Firewall Management Application – Prime Security Manager

For those who are not familiar with the Cisco Prime Security Manager, it is a management application that was introduced in 2012 to manage Cisco ASA 5500-X Series Next-Generation Firewalls. It is built on Web 2.0 technologies and supports both single-device and multi-device manager form factors to help manage various features such as Application Visibility and Control (AVC), along with web security in a simple, light-weight, and scalable manner. The AVC capability helps to block around 1200+ applications and 150,000+ micro-applications, in addition to specific users, behaviors, micro-applications, and devices. The web security service also provides URL filtering and Web reputation features to proactively restrict web application usage based on reputation of the site. Through Cisco Security Intelligence Operations (SIO), these services provide a comprehensive view of the local and global threat intelligence landscape. This is eventually translated to actionable items such as security polices and information feeds that protect your business from near real-time zero-day threats. Read More »

Tags: , , , , , , , ,

#EngineersUnplugged S4|Ep5: Secure the Infrastructure!

We all know we need it, but no one wants to talk about. Today, we break through that taboo. Secure the Infrastructure! This bold declaration brought to you courtesy of Matthew Brender (@mjbrender) and Mike Foley (@mikefoley) as they talk about how to use a hardening guide, and how to execute security in the real world. This is a great discussion about people, policy, and how not to be “the person who puts ‘no’ in innovation.”

Roll the video:

And it wouldn’t be Engineers Unplugged without a unicorn, in this case a security unicorn. Please do not try this at home.

Matthew Brender and Mike Foley with a secure unicorn, complete with ninja star and high kicks. We all feel more secure now.

Matthew Brender and Mike Foley with a secure unicorn, complete with ninja star and high kicks. We all feel more secure now.

What are you seeing in the industry? Agree or disagree, post a comment, send a tweet, follow along using one of the methods below!

Welcome to Engineers Unplugged, where technologists talk to each other the way they know best, with a whiteboard. The rules are simple:

  1. Episodes will publish weekly (or as close to it as we can manage)
  2. Subscribe to the podcast here:
  3. Follow the #engineersunplugged conversation on Twitter
  4. Submit ideas for episodes or volunteer to appear by Tweeting to @CommsNinja
  5. Practice drawing unicorns

Join the behind the scenes by liking Engineers Unplugged on Facebook.

Tags: , , ,