I pulled some workshop hosting duty trying to fill Jimmy Ray’s big orange shoes this morning. The subject is a great one -- Intrusion Prevention in the Data Center with an incredibly sharp engineer, Stijn Vanveerdeghem. Stijn is one of those crazy smart security guys down in Austin, TX as he works with a bunch of old friends from the team of IDS experts we have there.
So much emphasis on the data center these days for obvious reasons and it makes sense that anytime we consolidate something valuable -- there is going to be an increase in creativity for how to get to it when your not supposed to.
We do these workshops as part of our TechWiseTV shows for their interactivity and the difference in the depth we can achieve. A number of references were made as to other resources, shows we have done as well as published papers and studies. I have included all the links we brought up below.
Data Centers are going through a rapid evolution due to industry trends of virtualization, cloud computing and bring your own device (BYOD) initiatives, putting an even greater strain on IT resources to secure the data, applications and access critical to the success of the business. Today’s data center must be secure and resilient to keep the enterprise running at maximum productivity; protecting its profitability and reputation.
The modern enterprise runs a wide array of commercial and customized applications, and the data within those applications is exactly what attackers are targeting. Those critical applications and servers within the data center continue to be the subject of targeted attacks and sophisticated malware. The 2012 Verizon Data Breach Report highlights that attacks against servers accounted for 94% of all data compromised last year. Strong security controls and visibility measures must be implemented to protect the integrity of the enterprise data center.
Some of the best conversations happen in private exchanges and I often wish we could all benefit more broadly. This most recent conversation was instructive in and of itself but it also pointed out a level of transparency both Jimmy Ray and I prefer. So hopefully it goes to say -- we welcome your input! We certainly don’t get it right all the time!
The original vision of a ‘borderless’ continues to play out this week at Interop and we have a TechWiseTV episode covering all the details. ’Simplified and Secure’ is how Inbar Lasser-Raab put it. The power of ONE: Network, Managment and Policy
Sachin Gupta is our first guest expert here to explain how Cisco’s Unified Access Network offers simplified IT operations, reduced operational costs, and better scaling to accommodate the proliferation of devices and applications now and in the future.
The flexibility enabled by an IP based communication system is exemplified in how Cisco handles Session Management. In fact, the combination of ‘Session Management Edition and CUBE (Cisco Unified Border Element) remain the most cost effective way to transition from a traditional PBX environment without sacrificing previous investments.
The benefits can be grouped in three areas:
Save -- Lower costs and improve efficiency by using SIP trunking to interconnect networks using Cisco Unified Border Element
Simplify -- Reduce complexity by aggregating third-party PBXs, and easing migration to an all-IP environment.
Extend -- Deploy collaboration applications at the network core and extend them to users, even those on third-party PBXs
In this latest in the Fundamentals series from TechWiseTV, we tackle the core technology hopefully explains it in a fun way. Get your head wrapped around Session Management and make sure you are not missing anything!