Security Group tags

May 19, 2014

NETWORKING

Announcing: New Catalyst 3850 SFP Fiber Switch Models Expand Cisco Unified Access

2 min read

Over a year ago, Cisco launched its first flagship Catalyst 3850 series switches at Cisco Live London. With its integrated wireless LAN controller functionality and the innovative UADP ASIC, the Catalyst 3850 switches provide a converged wired and wireless platform that is the heart of “One Network” in the Cisco Unified Access “One Policy. One […]

February 3, 2014

SECURITY

Taking Complexity Out of Network Security – Simplifying Firewall Rules with TrustSec

3 min read

Bruce Schneier, the security technologist and author famously said, “Complexity is the worst enemy of security.” We have been working with some customers who agree strongly with this sentiment because they have been struggling with increasing complexity in their access control lists and firewall rules. Typical indicators of operational complexity have been: The time that […]

January 6, 2014

NETWORKING

Access Control with Cisco TrustSec: Moving from “IP Addresses” to “Roles and Attributes”

4 min read

Today’s enterprise is a highly dynamic, and hyper connected environment where IT plays a critical role in connecting the users, devices, resources and corporate IT systems. Today’s employees are also highly mobile in nature and do not necessarily have a single workspace assignment. The IT departments are constantly being challenged by the organization’s Line of […]

November 12, 2013

SECURITY

Security: Front and Center at Cisco Live Cancun 2013

4 min read

This year I was honored to be able to present and participate at Cisco Live Cancun, which took place last week. Many attendees from North, Central and South America and...

February 19, 2013

NETWORKING

Demystifying the Catalyst: Cisco Context Aware Secure Access (Security Group Tags – SGT) Technology

In this blog, let us take a look at how Catalyst access switches enable and enforce context aware access to IT resources. Many types of devices, including laptops, smartphones, and tablets, are used by end users to connect to the network wired, wirelessly, and remotely through VPN. With bring your own device (BYOD) access, the […]