This is the first in a two-part blog series that examines the opportunities that cloud-based services offer to law enforcement agencies—along with the challenges of this fundamental shift in the way information resources are managed.
Police forces have a well-established culture of owning and managing systems directly founded on concerns about security and control of access to information. Three trends, however, make this position unsustainable:
- Traditional models for acquiring and running systems, which slow the pace of innovation
- Increasing need to form partnerships with other police agencies, public-sector bodies, and the private sector. Partnership depends on information sharing and open approaches to developing systems.
One of the most radical—and successful—cloud-based public-safety and security services is Facewatch. Using a network-based model, Facewatch provides an online reporting tool that allows U.K. businesses and citizens to report crimes and attach video evidence. The service enables crime victims to cancel credit cards instantly through Facewatch’s partners; allows users to share images of wanted people; and provides a channel for feedback from the police on the outcomes of cases.
Facewatch offers immediate benefits to the public, businesses, and law enforcement:
- Citizens: ease of reporting and rapid management of associated processes
- Businesses: less time required to deal with incidents
- Law enforcement: reduces or eliminates the need to interact directly with premises to recover video footage
For all users, there is greater transparency about processes and reporting on outcomes, as well as the ability for communities to share information about wanted persons and crime trends.
Read More »
Tags: Cisco, cloud, Cloud Computing, Facewatch, IBSG, law enforcement, network, networking, police, Public Safety, security, social media, technology, United Kingdom
Connected devices are spreading like kudzu on the Carolina roadside. Cisco Identity Services Engine (ISE) is a great way to manage the devices on your network and with implementing some best practices, I can say you will save time. Below are 7 ideas that will help:
1. Find an Executive Sponsor.
Security policies can now be supported at a network level using ISE. Official IT policies around accessing information based on BYOD were often circumvented. But now with ISE, we’ve been able to implement policies that provide the right access, but can’t be circumvented. This makes it more important than ever that you have executive-level sponsorship. Truth be told, which IT project wouldn’t benefit from the executive backing? My first experience with an executive sponsor was with an excellent CIO who resembled Pope Francis and spoke like a wicked good Bostonian. He tasked me with pursuing business groups and obtaining feedback on IT process changes. The CIO called me his “Man in Havana”. My coworkers lovingly changed it to “Cabana boy” because we made fun of each other at every opportunity. The point is, busy manufacturing and software development directors found time for my questions and follow-up meetings because an executive was driving the effort.
Read More »
Tags: byod, ISE, security, security policy, wifi
On Tuesday May 28, 2013 at 17:30 UTC a massive pharmaceutical-based spam campaign began, using the Subject: header “Only 24 Hours Left to Shop!”. Cisco witnessed volume rates peaking as high as 8 out of every 10 spam messages being sent. The indiscriminate nature of the attack’s recipients suggests that most anti-spam vendors, including Cisco, will have blocked this attack very quickly.
Read More »
Tags: security, spam, TRAC
Security and Compliance is the next domain in our Cisco Domain TenSM model that I will cover, following on from my previous post on Applications. And following on from my previous posts around Cisco Domain Ten, I’ll give you a brief overview of the questions that come up when we discuss data center security and compliance challenges with customers as we help them transform data centers, migrate applications to Cisco UCS, and adopt cloud computing solutions and architectures. Security has and continues to be a major focus area in Cisco, so it was great to see Cisco come top in the recent survey by Infonetics Research, “Data Center Security Strategies and Vendor Leadership: North American Enterprise Survey, March 2013”!
Domain 9: Security and Compliance
Security and compliance are indeed exciting areas, indeed security is often highlighted in surveys – including my own survey of Cisco customers a few years back now – as the #1 issue impacting customer adoption of cloud computing. So what are come of the issues, challenges and considerations should be on your mind with respect to security and compliance in the data center and cloud?
Read More »
Tags: architecture, Cisco Domain Ten, cloud_computing, data center, security
My two favorite days for a Vegas conference: arriving and leaving. Everything in between is a foot numbing, sleepless blur. But we had a great time! It was cool to be on stage hanging with our Cisco friends and getting to re-unite with old competitors, many of which are former peers.
We did not have as many videos as usual for a trip like this since we were doing the ‘stand and deliver’ thing. The topics were good however.
Jacob Rapp on Unified Access trends in the Data Center
Mark Royle catching us up on Unified Call Control
Bill and Ziad: Global Security Intelligence
This was a two-fer that Jimmy Ray and I tag teamed…I feel the urge to call it ‘Unified’ something just to complete my corporate marketing bingo card….but I did giggle a bit knowing that we stood in front of the ‘MOC SOC’ (Mock Security Operations Center). I am not even sure why I find that funny.
Please check out the Success Factors video we did with Marlowe Fenne. . I blogged about Unified Access (BINGO!) yesterday.
My work here is done.
Thanks for watching!
Twitter: @TechWiseTV, @robbboyd, @jimmyray_purser
TechWiseTV on YouTube
Keep up behind the scenes on our facebook fan page
Tags: Cisco Unified Call Control, interop, Interop 2013, Interop Las Vegas, JimmyRay_Purser, las vegas, security, TechWiseTV, Unified Fabric