Avatar

DDoS attacks are no longer just a nuisance and they can cause lasting damage. Organizations that ignore this threat often learn the high costs involved in the damage from these attacks – ranging from mild service degradation and to extended service outage. According to Aberdeen Group research, the cost of a one second delay in website load time can translate to a 7% reduction in conversion rate and up to $2.5 million in losses per year. The cost of outage? That can reach nearly half a million dollars per hour.

Attacks have evolved in multiple dimensions: Continue reading “Radware and Cisco Sign OEM Agreement As DDoS Mitigation Becomes a SP Imperative”

Authors

Ron Meyran

Director of Alliances Marketing

Avatar

The recent passing of John Forbes Nash made me wonder how his ingenious game theory can be applied to technology innovation.

Very simply put, Nash’s theory of equilibrium puts forth that outcomes are more attainable for all parties when they work cooperatively toward a goal rather than against each other in isolation. Knowing each other’s mindset and working together gives each party a better chance at achieving his or her objective than working on their own.

This theory has been used to analyze everything from wars and sports to evolutionary biology and games of skill. Continue reading “Game Theory and the Power of Innovating as an Industry”

Authors

Alex Goryachev

Senior Director, Innovation Strategy & Programs

Corporate Strategic Innovation Group

Avatar

Today, Microsoft has released their monthly set of security bulletins designed to address security vulnerabilities within their products. This month’s release sees a total of 8 bulletins being released which address 45 CVE. Two of the bulletins are listed as Critical and address vulnerabilities in Internet Explorer and Windows Media Player. The remaining six bulletins are marked as Important and address vulnerabilities in Microsoft Office, Windows Kernel, Active Directory, Microsoft Exchange Server, and Microsoft Common Controls.

Continue reading “Microsoft Patch Tuesday – June 2015”

Authors

Talos Group

Talos Security Intelligence & Research Group

Avatar

Yesterday, over 25,000 Cisco customers, employees, and executives helped kick off Cisco Live US 2015 in San Diego, California, attending everything from John Chambers’ final keynote to the World of Solutions in the massive San Diego Convention Center. The venue, which measures over a quarter mile from end to end, features a public, secure wireless network for attendees to access from any room in the building.

Because of this network, they can tweet, post Facebook statuses, and share their favorite pictures on Instagram throughout the week, all without worrying about a faulty Internet connection. But who is keeping that network running, and who helped set it up?

As part of the Cisco Networking Academy Dream Team, students are building the skills they'll need to thrive in the connected economy.
As part of the Cisco Networking Academy Dream Team, students are building the skills they’ll need to thrive in the connected economy.

The Cisco Networking Academy Dream Team! As part of the Dream Team, 30 Networking Academy students have been working side-by-side with the Cisco IT team to maintain the event’s massive networks and develop the hands-on skills they’ll need to thrive in the connected economy.

Each year, more than 160,000 students in the United States and Canada enroll in Cisco Networking Academy courses, where they develop IT know-how and valuable problem-solving skills in preparation for jobs in the IT field. Of those thousands of candidates, 10 North American students are selected to participate, and another 20 local students join them to provide additional support.

Continue reading “Cisco Networking Academy Dream Team Thrives at Cisco Live US 2015”

Authors

Austin Belisle

No Longer with Cisco

Avatar

Hello, everyone! My name is Anne McClelland, and I am the new director for Cisco’s retail and hospitality sales team in the U.S. I’m excited to have the chance to write for Cisco’s retail blog program, and you’ll be hearing from me regularly sharing some insights, musings, and speculations on trends as well as giving you information about Cisco’s resources for the industry.

One of the interesting discussions that I’m having with our customers right now is about the relationship between eCommerce and the physical store, and how this relationship is being significantly redefined. Retailers are wrestling with how to leverage the store to improve online sales (and vice versa) to create a truly omnichannel buying experience for their customers.

To better align these channels, I’m seeing just how much retailers want to do more with consumer analytics. Retail executives are talking to us about their interest in finding new ways to understand who exactly the shoppers are, who is actually coming in their stores (and who is not), why they are or are not responding to promotions, and when they do buy: what was on their list vs. what was incremental to their planned purchases.  Retailers are also anxious to better understand and leverage the technology at the edge – at the store entrance, on the end-caps, in aisles, on the shelves, and on the goods themselves.

To make this all this magic happen, retailers find they need to upgrade network infrastructures; those who were not ready for all of these potential edge analytics are now finding themselves feeling a bit “behind the times.”  We are hearing that many of our retail and hospitality friends are looking to find creative new ways to light up the aisles and the back office. We are hearing very strategic questions such as, “Do we have too many stores?” “Are we over-invested in inventory and store footprint?” “Is there a way to streamline our operations?”  “Can we better integrate online and brick and mortar to gain efficiencies?”  Many retailers are integrating online delivery and returns to stores, as well as testing new models such as third-party package-delivery firms.  I’ll explore these topics in future blogs.

Meanwhile in the store itself, where the rubber meets the road, how are retailers differentiating today?  Where are the crowds of the people congregating?  Why are they there?  I think of the Apple store in our local mall, I think of the Disney store in Times Square. These stores are literally jammed.  Why is this?  Why is Apple’s store so jammed?  What has the Disney store done to evolve to drive crowds and new business concepts?

Innovation is key: Disney has made a business model around glamorizing the Disney princesses for their customers running “The Disney Princess Store,” including new services, videos, games, products.  They have opened up a mega-category that is a logical extension of what their customers love to do… dress up.  Why aren’t the department stores similarly jammed?  It’s all about innovation; it’s all about thinking deeply about the consumer; it’s about driving brand association and attraction; and it’s about executing on the “theater of retail.”

We’ll be joining Cisco’s partner NCR at the Synergy User Conference, being held June 22-25. I’ll be speaking there on the “Internet of Things: Retail Without Boundaries” and discussing how seemingly futuristic technologies are changing the way retailers interact with their customers – I hope to see you there!

I look forward to getting to know you in person and through this blog in the coming months. In the meantime, I invite you to extend your knowledge by attending our free summer retail webcasts:

  • June 16: “Delivering Successful Store-of-the-Future Experiences,” held at 10:00-11:00 am PT/1:00-2:00 pm ET, with Forrester Research’s Adam Silverman on improving store infrastructures and bandwidth. Register today.
  • July 14: “Make Your Data Meaningful: New Strategies for In-Store Shopper Experiences,” held at 10:00-11:00 am PT/1:00-2:00 pm ET, on new analytics capabilities for retail environments. Register today.

Feel free to connect with me at annmccle@cisco.com.

Authors

Anne M. McClelland

Director, Retail & Hospitality Practice

Avatar

Technical University of Applied Sciences Wildau understands that with the proliferation of wireless devices, learning is no longer relegated strictly to the classroom.  The German university wanted to equip its students with the ability to access their education resources anywhere and at any time. To provide this service, the University needed a secure environment for data, voice, voice over IP and video conferencing—and it wanted it to be unique from Germany’s 240 other universities of applied sciences.

wu

Cisco outfitted the school with 802.11ac-based WiFi access points—enhanced with Cisco CleanAir Technology and the Cisco High Density Experience—in various spots around the campus. This allowed for the Technical University of Applied Sciences Wildau the ability to provide interference-free and exceptional WiFi for their students and faculty for the first time. Continue reading “Wildau University Utilizes Cisco Wi-Fi Technology”

Authors

Byron Magrane

Product Manager, Marketing

Avatar

In this 5th why I love big data blog series, I am joined by Jeff Aboud from Splunk to outline why big data security analytics is essential to today’s security challenges.

Untitled SplunkJeff Aboud, Sr. Solutions Marketing Manager, Security Markets, Splunk Jeff Aboud has more than a dozen years in various areas of the security industry, spanning from the desktop to the cloud, including desktop AV, gateway hardware and software, encryption technologies, and how to securely embrace the Internet of Things. His primary focus today is to help business and security professionals understand how to visualize, analyze, and alert across a broad range of data sources in real time to maximize their security posture.

 

 

It’s no secret that advanced threats and malicious insiders present increasing security challenges to organizations of all sizes. Security professionals know that it’s not matter a question of if, but when an attack will successfully breach their network. Visibility is often what makes the difference between a breach and a major security incident, and enables proactive security posture throughout the attack continuum – before, during, and after the attack. It’s also essential to understand that the fingerprints of an advanced threat are often located in the “non-security” data, so the effective detection and investigation of these threats, before your data is stolen, requires security and non-security data.

So what does all this really mean, and how can you use it do dramatically improve your security posture?

You need to integrate and correlate the data from your firewalls, intrusion prevention, anti-malware, and other security-specific solutions along with your “non-security” data such as the logs and packet information from your servers, switches, and routers. This is no easy task with the large number of different security solutions present in most enterprise networks. But having all your data at your fingertips will help you improve your detection capabilities and automate the remediation of advanced threats.

But how can you do this, since Security Information and Event Management (SIEM) systems only look at traditional security sources? The partnership between Splunk and Cisco is the answer. Splunk is integrated across Cisco security platforms, as well as other places throughout the network including various Cisco switches, routers and Cisco Unified Computing Systems (UCS) to deliver broad visibility across your environment.

Together, Splunk and Cisco provide security and incident response teams the tools they need to quickly identify advanced threats, visualize them in real-time across potentially thousands of data sources, and take automated remediation action on Cisco firewalls and intrusion prevention systems. Continue reading “Why I Love Big Data Partner Series 5: Cisco and Splunk: The Weapons of a Security Warrior”

Authors

Jim McHugh

Vice President, Product and Solutions Marketing

Unified Computing Systems

Avatar

Security has never been more critical for service providers. As Sanjeev Mervana said in his recent blog: Security has become a service provider imperative. it is a key enabler for open and programmable networks that enhances business agility and profitability. With secure networks, emerging video, wireless mobility, Internet of Everything (IoE) and cloud services can more reliably drive new revenue opportunities and business outcomes. Unfortunately, cyber adversaries exploit the growing attack surface that these services expose by launching more sophisticated attacks that impact both the service provider and their customers.

Until now, the only viable approach for service providers to protect their networks has been to Continue reading “Threat-Centric Security for Service Providers”

Authors

Sam Rastogi

Senior Product & Solutions Marketing Manager

Avatar

The rapid expansion of connected devices is a double-edged sword for businesses. On one hand, mobility, cloud, and BYOD innovations enable unprecedented flexibility, collaboration, and ease of access for employees. Fifty percent of employers will adopt BYOD policies by 2017, and 90 percent of American workers are already using their own smartphones for work.[1] But this flexibility comes with a cost: as endpoints multiply, controlling network access becomes increasingly difficult. The vast majority – 90 percent – of organizations lack full awareness of all of the devices accessing their network.[2] At the same time, insiders perpetrate 34 percent of all cybercrimes highlighting the key role of identity access management in maintaining a strong cybersecurity posture.[3]

Continue reading “Hosted Identity Services: Scaling Security in the Age of Mobility”

Authors

Tom Powledge

VP, Managed Security Services