We had to dig further, past our initial meetings internally and determine what would make this particular story unique from previous ones we have told this year. As it turns out, we had plenty of material to share but three really good shows done earlier, now provide great context for appreciating the innovation we talk about in this one.
Check out: Fundamentals of High End Firewalls, Fundamentals of Intrusion Prevention and (TechWiseTV 115) Firewall Reinvention with the ASA-CX
So topically, Security in the Data Center is an easy hit of course. It almost sounds like an Oxymoron as many are convinced it is some kind of insurmountable obstacle. Nothing could be further from the truth. It seems to top many lists. [Watch ‘Defending the Data Center’ Right Now.]
As Cisco broadens the tool set with new models and deployment options, we broke this one down along party lines:
Read More »
Tags: ASA, ASA 1000V, cloud, firewall, IPS, security, SGT, TrustSec, virtual
In part one of our series on Cisco’s Secure Data Center Strategy, we did a deeper dive on segmentation. As a refresh, segmentation can be broke into three key areas. The first, the need to create boundaries is caused because perimeters are beginning to dissolve and many environments are no longer trusted forcing us to segment compute resources, the network and virtualized attributes and environments. Along with segmenting physical components, policies must be segmented by function, device, and organizational division. Lastly, segmenting access control around networks and resources whether they are compute, network, or applications offers a higher level of granularity and control. This includes role-based access and context based access. Ensuring policy transition across the boundaries is of primary concern. To learn more on segmentation go here.
Today we will dive deeper into Cisco’s security value-add of threat defense.
Technology trends such as cloud computing, proliferation of personal devices, and collaboration are enabling more efficient business practices, but they are also putting a strain on the data center and adding new security risks. As technology becomes more sophisticated, so are targeted attacks, and these security breaches, as a result, are far more costly. The next figure is from Information Weeks 2012 Strategic Security Survey and illustrates top security breaches over the previous year.
Read More »
Tags: Cisco ASA, cisco firewall, Cisco Security, cisco sio, Cisco UCS, cloud, data center, data center security, DC, firewall, intrusion prevention, IPS, it security, network security, pci-dss, security, server, threat defense, virtual, virtualization
Last week Cisco announced several new products in it’s Defending the Data Center launch. These included the Cisco Adaptive Security Appliance Software Release 9.0, Cisco IPS 4500 Series Sensors, Cisco Security Manager 4.3, and the Cisco ASA 1000V Cloud Firewall, adding enhanced performance, management, and threat defense capabilities. Core to this launch was also Cisco’s new strategy for developing Secure Data Center Solutions, a holistic approach similar to what Cisco previously did with Secure BYOD. This new strategy integrates Cisco security products into Cisco’s networking and data center portfolio to create validated designs and smart solutions. Organizations that lack bandwidth and resources or the know how to test and validate holistic designs can simply deploy template configurations based on pre-tested environments that cover complete data center infrastructures. These designs enable predictable, reliable deployment of solutions and business services and allow customers infrastructures to evolve as their data center needs change.
In developing this strategy we interviewed numerous customers, partners and field-sales reps to formulate the role of security in the data center and how to effectively get to the next step in the data center evolution or journey, whether you are just beginning to virtualize or have already advanced to exploring various cloud models. Three security priorities consistently came up and became the core of our strategy of delivering the security added value. They are Segmentation, Threat-Defense and Visibility. This blog series, beginning with segmentation, will provide a deeper dive into these three pillars.
Segmentation itself can be broken into three key areas. Perimeters are beginning to dissolve and many environments are no longer trusted, forcing us to segment compute resources, the network, and virtualized environments to create new boundaries, or zones. Along with segmenting physical components, policies must include segmentation of virtual networks and virtual machines, as well as by function, device, and logical association. Lastly, segmenting access control around networks and resources whether they are compute, network or applications offers a higher level of granularity and control. This includes role-based access and context based access. Let’s discuss even deeper.
Read More »
Tags: Cisco ASA, cisco firewall, Cisco Security, Cisco UCS, cloud, data center, data center security, DC, firewall, intrusion prevention, IPS, it security, network security, pci-dss, security, server, virtual, virtualization
This past spring, Cisco and John Lewis—the United Kingdom’s leading department store retailer—successfully completed their pilot of the Cisco StyleMe virtual fashion mirror. The Cisco Internet Business Solutions Group (IBSG) ran the pilot, while partnering with C In-store and AITech.
During the six-week pilot (April and May), more than 1,000 customers tried StyleMe (an average of 40 a day)—far more than expected. In addition:
- A staggering 34,000-plus garments were viewed in the outfit builder, and almost 2,500 garments were tried on virtually.
- 67 percent of customers gave the mirror a positive assessment, and some great shopper stories emerged—including one from a delighted disabled lady, who was able to try on clothes for the first time in a store, thanks to Cisco StyleMe.
The John Lewis Partners (staff) also loved it. They found that StyleMe was a tool that created shop floor “theater” (crowds formed) while helping them provide great service sell even more effectively. They came up with lots of ideas on how to develop the experience even further.
We learned several key lessons.
Read More »
Tags: artificial intelligence, Cisco, clothes, clothing, gesture recognition, IBSG, John Lewis, pilot, retail, shoppers, shopping, StyleMe, virtual, Virtual Fashion Mirror, virtual reality
There are seismic shifts taking place in our increasingly connected society. Mobile phones and devices aren’t just for staying in touch—they’re instruments of commerce, learning and entertainment. Social networking sites are creating communities of interest around any topic you can imagine—and whatever you’re into, there’s an app for that. Video is everywhere. Not just in the board room and on the desktop but the office lobby, the medical center, the sports arena, even the bottom on the ocean. And perhaps most importantly, Read More »
Tags: carl, carl_wiese, carl_wiese_blog, cisco_unified_communications, collaboration, collaboration_architecture_blog, collaboration_imperative, collaboration_imperative_blog, Collaborative, contact_center, experience, IM, intercompany_collaboration_blog, mobile, mobility, ricci, ron_ricci, ron_ricci_blog, social, unified_communications, video, virtual, virtualization, wiese