Cisco Blogs


Cisco Blog > Data Center and Cloud

Bring Your Own Service: Why It Needs to be on InfoSec’s Radar

Security concerns around cloud adoption can keep many IT and business leaders up at night. This blog series examines how organizations can take control of their cloud strategies. The first blog of this series discussing the role of data security in the cloud can be found here. The second blog of this series highlighting drivers for managed security and what to look for in a cloud provider can be found here.

In today’s workplace, employees are encouraged to find the most agile ways to accomplish business: this extends beyond using their own devices to work on from anywhere, anytime and at any place to now choosing which cloud services to use.

Why Bring Your Own Service Needs to be on Infosec's Radar

Why Bring Your Own Service Needs to be on Infosec’s Radar

In many instances, most of this happens with little IT engagement. In fact, according to a 2013 Fortinet Survey, Generation Y users are increasingly willing to skirt such policies to use their own devices and cloud services. Couple this user behavior with estimates from Cisco’s Global Cloud Index that by the year 2017, over two thirds of all data center traffic will be based in the cloud proves that cloud computing is undeniable and unstoppable.

With this information in mind, how should IT and InfoSec teams manage their company’s data when hundreds of instances of new cloud deployments happen each month without their knowledge?

Additionally, what provisions need to be in place to limit risks from data being stored, processed and managed by third parties?

Here are a few considerations for IT and InfoSec teams as they try to secure our world of many clouds:

Read More »

Tags: , , , , , , , , , , , , , ,

Boingo Takes Next Generation Hotspot from Roadmap to Real Life

This is a customer perspective guest blog contributed by Zack Sterngold, Boingo Wireless Vice President, Americas.

NGH_iphone

The vision for a simple, seamless and secure Wi-Fi connectivity experience became a reality timed to this year’s Mobile World Congress. And by design, this major milestone was simple, unobtrusive and even invisible to those who weren’t looking for it.

Years in development, Next Generation Hotspot protocol trials have been put to the test at industry conferences around the world, from Beijing to Paris, to the first commercial Next Generation Hotspot test bed at Chicago O’Hare Airport, launched by Boingo in late 2013. At MWC 2014, Cisco, AT&T and Accuris partnered to bring a Hotspot 2.0 network to the Fira Gran Via, reaching the largest audience of industry influencers ever.

Halfway around the world, the Boingo team made a bold move. The time for limiting easy, secure Next Generation Hotspot connectivity to the industry elite had passed. The time had come to invite the multitude of consumers looking for fast, seamless connectivity to experience the future of wireless. Read More »

Tags: , , , , , , ,

Why Information and Communication Technology (ICT) Matters for Girls

I am writing this blog as the 2014 recipient of the IEEE Women in Engineering Region 8 Clementina Saduwa Award named after an amazing woman whose life was cut short in 2007. On a personal level, I am extremely passionate about the possibilities that technology presents for young girls and aspiring women. As a CTO for Cisco Services, my own role is concentrated on the use of technologies to develop architectures that will delight our customers. Why is technology interesting to me?  It’s what one can do with the technology as an enabler to solving problems and to creating opportunities.

I became interested in technology because of my curiosity and encouragement from wonderful individuals who helped pave the way for me. My personal career highlights are numerous where risk taking and passion for making a difference in this world are common attributes. Our world needs young girls to create their own career path in Information and Communication Technology (ICT). A career in technology can be fun!

My mother was role model and encouraged me to be the person I want to be. Coming together to solve a problem and to create opportunities – we can rise above gender discrimination -- but it’s about being bold in the process and having the courage to do so -make no doubt about this fact.  I dream of a society where such a topic is no longer an issue but so engrained in our DNA !

What is Cisco doing?

Cisco has been very active in the ITU’s Girls in ICT initiative, where girls from secondary schools or universities are invited to spend the day at the office of ICT companies and government agencies so they better understand the opportunities the ICT sector holds for their future see.

ITU will have a live webcast on April 15 2014 at 12:30 CET.

Cisco wants to encourage girls to consider ICT as a valuable career option. We understand the value of diversity in the workforce and it is our aspiration to build a gender -balanced workforce. At Cisco, two of the top technology positions are held by women: both the Chief Technology Officer (CTO) and the CIO (Chief Information Officer) of Cisco are female. “If you cannot see it, you cannot be it!”

At Cisco, we take our commitment to making ICT career opportunities open to all seriously. We understand the value of a diverse workforce and believe that many more girls would pursue careers in ICT if they were better informed about the many different types of jobs available within the sector. By 2020 there will be approximately 50 billion things connected to the Internet. At its essence, the Internet of Everything is the networked connection of people, process, data and things…and is set to create an unprecedented level of disruption across industries, globally.

In fact,  Cisco offices around the world are getting ready to host #GirlsInICT Day 2014! Girls to create ICT jobs of tomorrow #STEM #GirlsInIC

Further Read More »

Tags: , ,

VoLTE – A game changer for Policy

Alfonsov2By Alfonso San Jose, Sales Consulting Systems Engineer

Now that LTE networks have been rolled out by most of the service providers in the world, the next objective for operators is the migration of the voice service to the LTE network. This migration is known as Voice over LTE or VoLTE.

VoLTE brings the two sides of the same coin. On the one hand, VoLTE is bringing multiple benefits for service providers (spectrum efficiency, high quality voice, OPEX & CAPEX reduction, etc) but on the other hand, VoLTE service is also bringing some challenges. Those challenges have an special impact on the Policy Management solutions currently deployed for Data Services as this node becomes a critical node in the network for VoLTE.

Policy Management plays a significant role in VoLTE and becomes a mandatory node in the network. This node is responsible for establishing and releasing, on behalf of the IMS domain, the bearer required to accommodate voice traffic.

Additionally, Read More »

Tags: , , , ,

Drivers for Managed Security and what to look for in a Cloud Provider [Summary]

The first blog of this series discussing the role of data security in the cloud can be found here.

In 2014 and onward, security professionals can expect to see entire corporate perimeters extended to the cloud, making it essential to choose a service provider that can deliver the security that your business needs.

While organizations can let business needs trade down security we’ve begun to see how a recent slew of data breaches are encouraging greater vigilance around security concerns. For example, a recent CloudTweaks article highlights the need for organizations to be confident in their choice of cloud providers and their control over data. IT leaders have the power to control where sensitive information is stored. They also have the power to choose how, where and by whom information can be accessed.

An important driver in mitigating risk and increasing security is to ask the right questions.

An important driver in mitigating risk and increasing security is to ask the right questions.

Institute Control By Asking the Right Questions

However, adding to fears about ceding the control of data to the cloud is lack of transparency and accountability about how cloud hosting partner/ providers secure data and ensure a secure and compliant infrastructure.  Cloud consuming organizations often don’t ask enough questions about what is contained in their  service-level agreements, and about the process for updating security software and patching both network and API vulnerabilities.

Organizations need reassurance that a cloud provider has a robust set of policies, process and than is using automated as well as the latest technologies to detect, thwart and mitigate attacks, while in progress as well as be prepared to mitigate after an attack.

An important driver in mitigating risk and increasing security is to ask the right questions. When evaluating cloud service providers, IT leaders need to ask:  Read the full blog here.

Tags: , , , , , , , , , , , , , , ,