Cisco Blogs


Cisco Blog > Partner

Cisco Partner Weekly Rewind – October 11, 2013

October 11, 2013 at 8:18 am PST

Partner-Weekly-Rewind-v2Every Friday, we’ll highlight the most important Cisco partner news and stories of the week, as well as point you to important, Cisco-related partner content you may have missed along the way. Here’s what you might have missed this week:

Off the Top

Cisco completed its acquisition of Sourcefire this week. This move brings Sourcefire’s competitive technology and talent into the Cisco family, but what does that mean to partners?

Ken Trombetta took some time this week to offer his thoughts on the Sourcefire acquisition’s effect on channel partners. He also affirmed Cisco’s commitment to making the integration as seamless as possible for Cisco Channel Partners.

Be sure to check out Ken’s blog and give us your thoughts on the Sourcefire acquisition. Read More »

Tags: , , , ,

Cisco Closes Acquisition of Sourcefire; What Does that Mean to You?

Mobility, cloud and the Internet of Everything (IoE) continue to change IT security making point product solutions insufficient. The old model of having disparate products securing isolated areas simply won’t protect against the dynamic threats of today’s world. In the ever-growing world of the Internet of Everything (IoE) the number of attack vectors will only increase.  Today’s security solutions require a continuous approach that is much more automatic when handling security threats before, during and after an attack.

The good news for our partners is that the acquisition of Sourcefire is complete. With Sourcefire part of the Cisco family, we will provide partners with a broad portfolio of integrated solutions that deliver unmatched visibility and continuous advanced threat protection across the entire attack continuum, and partners can:

  • Work with one vendor to offer a wide range of industry leading security offerings;
  • Become or remain more competitive in the security space; and
  • Use the support of Cisco to build your security business Read More »

Tags: , ,

SUMMARY – Martin Roesch on Sourcefire Becoming Part of Cisco

October 8, 2013 at 8:43 am PST

Cisco Security has announced the closing of the acquisition of Sourcefire.  Sourcefire founder and CTO (and creator of Snort®) Martin Roesch posted to Sourcefire’s blog this morning to share the news:

“I can tell you with certainty that this is a great match for Sourcefire, for Cisco and, ultimately, for our customers, partners and open source communities” said Roesch.  “From a technology perspective, after having dedicated 15 years to Snort and then to Sourcefire, it’s personally gratifying to be part of building this strong foundation.”

Roesch, now vice president and chief architect of Cisco’s Security Business Group, is excited for the new opportunities presented.  “It’s the new model of security I’ve been talking about for some time.  Now working as part of the Cisco team, led by Chris Young, we can accelerate execution of this vision and make this even more impactful.”

This is just the first exciting news about the acquisition.  As Roesch states in his post, “expect more great things as we continue down this path as ONE team.”

Read the full post: http://blog.sourcefire.com/Post/2013/10/08/1381233600-one-team--sourcefire-is-now-part-of-cisco/

Tags: , , , ,

SUMMARY Chris Young: Cisco Closes Sourcefire Acquisition; Delivers Threat-Centric Security Model

October 8, 2013 at 5:38 am PST

Chris Young, SVP of Cisco’s Security Business Group, posted an official announcement this morning on Cisco’s The Platform blog heralding the close of the Sourcefire acquisition.

 “I am excited to announce that Cisco has completed the acquisition of Sourcefire. With this acquisition, we take a significant and exciting step in our journey to define the future of security. As one company, we offer an unbeatable combination that will greatly accelerate our mission of delivering a new, threat-centric security model”, said Young.

Young also goes in-depth regarding the new capabilities immediately available to current Cisco customers as well as what the acquisition means for Cisco Security roadmap:

  • Leverage current ASA and FirePOWER hardware for future solutions
  • Give Cisco customers immediate access to Sourcefire’s NGIPS, NGFW, and AMP solutions
  • Committing to support open-source projects like Snort, ClamAV, and others
  • Broader solution sets incorporating the newly acquired technologies

This year, Cisco has increased investment in security innovation to provide market-leading threat-focused capabilities.

Young also promised Cisco Security will focus on a “threat-centric” security model moving forward – which means a priority focus on the threats themselves versus policy or controls. “Through our threat-centric model,” he said “we will provide broad coverage across all potential attack vectors, rapidly adjust to and learn from new attack methods, and implement that intelligence back into the infrastructure after each attack.”

Read the full post with all the exciting details here:  http://blogs.cisco.com/news/cisco-closes-sourcefire-acquisition-delivers-threat-centric-security-model

Tags: , , , ,

Cisco Closes Sourcefire Acquisition; Delivers Threat-Centric Security Model

I am excited to announce that Cisco has completed the acquisition of Sourcefire. With this acquisition, we take a significant and exciting step in our journey to define the future of security. As one company, we offer an unbeatable combination that will greatly accelerate our mission of delivering a new, threat-centric security model. Through the addition of Sourcefire’s competitive talent and technologies, I see vast opportunities to expand Cisco’s global security footprint in both new and emerging markets, broaden our solution sets and deepen our customer relationships.

Security is now a boardroom discussion. Breaches mean lost IP, compromised customer information, lack of confidence and valuation impact. In tomorrow’s world of the Internet of Everything, the number and type of attack vectors will continue to increase, creating a daunting challenge for companies and those responsible to defend the infrastructure.

The single network perimeter has been replaced by a constantly morphing set of users, locations, access methods and devices creating the dual challenge of defending a dynamic perimeter and creating a near infinite number of points of vulnerability.  

Read More »

Tags: ,