Avatar

Pathway OptionsThe IT industry is in a significant period of transition, and the infrastructure landscape has changed a great deal. There are many options today, and the number of options will grow over the next two years. Having more options can more lead to complexity and potential limitation.  As you assess your options you need more information and context, so you can make the right choices and avoid problems down the road.

Software defined infrastructure (SDI) has made it possible to create these new categories of products.  In addition to traditional rack and blade servers and SAN storage, there is converged infrastructure, hyper-converge infrastructure and now composable infrastructure. As you evaluate these new infrastructure options, one of the most important considerations is choosing the right management software to support these products.  You don’t want to add to complexity by creating islands of infrastructure that need to be managed separately.

Continue reading “Composable Infrastructure Part 6: Understanding Infrastructure Options”

Authors

Ken Spear

Sr. Marketing Manager, Automation

UCS Solution Marketing

Avatar

A digital transformation is already upon us.  Customer buying behavior is dramatically different than it was 10 years ago.  If you haven’t adapted already, growing your business may require big shifts in the way you do business.

It’s no surprise that your customers prefer to do business online.  They are buying more online services, subscriptions, and cloud-based solutions than ever before. This digitization in buying behavior means fewer phone calls and less face time, which can make it difficult to differentiate from your competitors and provide the extraordinary customer experience that consumers have come to expect. While on the surface, these trends may seem like an obstacle to growth, forward-thinking organizations are taking advantage of the digital shift, modernizing their customer engagement model, improving customer retention and growing revenues.

The Cisco Global Customer Success (GCS) organization has been hard at work developing a model for customer engagement that puts our partners front and center in the digital sales process, making it easier for you to sell—and easier for your customers to buy in a digital world. Unifying people, process, analytics, and automation, this proven methodology not only simplifies sales, but also helps to create customers for life. If that sounds too good to be true, or too complex for your business, then you’ll want to attend our January 19 webinar, “How to Automate and Digitize Customer Engagement.”

You’ll learn how data-driven, automated selling motions can help you connect more effectively with your customers throughout their journey with you—from the moment a product or service is purchased; to the point that it is adopted; and across the important upsell, cross-sell, renew, and refresh phases. Through an intelligent approach to digital engagement, you’ll be in position to reach out to the right customers at the right time with the right offers throughout each of these stages. You’ll also discover untapped opportunities, along with new ways to scale your sales practice, reduce costs, and gain greater profitability.

Most importantly, with the right digital strategies and tools, you can help your clients achieve stronger business outcomes, which means they’ll increase their trust in you.

Ready to hear more? Sign up for our January 19 Customer Success Talks webinar.

Webinar Details

Webinar Title:           How to Automate and Digitize Customer Engagement

Date and Time:         January 19, 11:00am PT

Register:                    Register Today

Key Takeaways

  • Learn how to use digital engagement to nurture sales throughout all phases of the customer journey;
  • Harness the power of data to identify new sales and renewal opportunities and proactively address them with your clients;
  • Improve product and services adoption to help customers get the most value out of their Cisco investments;
  • Scale your business, reduce costs, and increase profits through the use of strategic new tools

 

Authors

Steve Cox

Vice President, Employee Experience

Avatar

The tech-fest that is the annual International Consumer Electronics Show (CES) is just under a month away, and we’re celebrating it with a live Tweet-chat from Las Vegas, to dig into the intersections between devices, and the cloud.

Cisco_LinkedIn CiscoChat_TransformVidServices

The numbers alone make it a big topic: An astonishing 80% of the world’s Internet traffic will be video by 2019, according to our latest Visual Networking Index, and the average household will have nearly five (4.3, technically) Internet Protocol/IP connections. (Bet you a dollar your house already has more than 4.3…)

That’s why the interplay between devices and cloud is Continue reading “Cloud Baby, Cloud! A CES Tweet Chat (#CiscoChat) About the Interplay Between Devices & Clouds”

Authors

Ying Shen

No Longer with Cisco

Avatar

The 802.11ac Wave 2 standard is coming soon. Companies who specialize in wireless networks have been trumpeting that fact for over a year while simultaneously claiming that their products are the best solutions. There is only one company that aced the performance tests and costs a lot less than its competition—the answer may surprise you.

KQ63034Miercom compared three Cisco Wave 2-based access points, with 802.11ac Wave 2-based Aruba and Ruckus Wave 2 access point. The independent testing lab found that the Cisco access points trounced the other brands in its performance tests. Not only did the Cisco access points— the Cisco Aironet 1852i in particular—meet or exceed the performance of Aruba and Ruckus products, but it was also a less expensive solution than the others. In fact, the Cisco Aironet products were anywhere from $300 to $400 less expensive than the Aruba or Ruckus devices.

The Cisco Aironet 1852i was the only access point that could deliver an aggregate throughput of over 1Gbps. Providing 1Gbps of throughput is a major feature of the Wave 2 standard. Neither the Ruckus R710—which tested at 570Mbps—or the Aruba AP-326—which registered at just 350Mbps—could deliver anywhere close to the Cisco number.

In a test where the number of clients grows from 10 to 100, the Continue reading “Miercom Says: Cisco Wave 2 Access Points Best in the Business”

Authors

Byron Magrane

Product Manager, Marketing

Avatar

It seems like these days, you can’t read the news without seeing something about a cyberattack or data breach. While the digital economy and the Internet of Everything (IoE) are creating huge opportunities for value creation in both the public and private sectors, they also create huge opportunities for security breaches. With an expanded attack surface created by the IoE, cybercriminals look to take advantage of the influx of new devices and increasing network complexity. While a large cyberattack on a private company might be painful financially, a hack on some of our nation’s defense agencies could hurt much more.

The Department of Defense (DoD) is a high-priority target for hackers of all types, but especially for advanced malware creators who are seeking to steal intellectual property, capabilities and strategies from the U.S. government.  These threats aren’t only isolated incidents from hacktivist groups; they often come from other advanced nation-states. The protection of military information and network assets is a part of national security and the DoD needs the tools to protect itself from cyberattacks.

One way the DoD and other agencies are looking to better protect their networks is by using advanced malware protection (AMP) tools. AMP helps detect “bad” files as they move across a sensor and flags the files for removal so that they don’t corrupt the rest of the network. Cisco’s AMP services are industry-leading; it was named a leader in Gartner Magic Quadrants for Intrusion Prevention Systems in 2014 and improved its position in 2015. It was also tested during NSS Labs’ rigorous next-generation firewall testing and received the highest effectiveness rating possible.

Figure1
Figure 1. Gartner’s 2015 Magic Quadrant for Intrusion Prevention Systems

Cisco AMP is unique from its competitors in that it can place sensors throughout the network. Unlike most companies’ sensors, which must be attached to the firewall, Cisco’s sensors are compatible with a large variety of devices and platforms, such as switches, virtual machines and the cloud. By allowing for sensors in other places in the network, Cisco AMP casts a wider and finer net to catch malware.

Additionally, Cisco AMP tracks files throughout the whole network. For most advanced malware systems, a file is only flagged as good or bad when it crosses a sensor. But with Cisco AMP, the file is tracked throughout and continually evaluated. That means if a file was initially tagged as good but more information appears, Cisco AMP can detect that anywhere in the network, flag it, and have the file removed. Continuously monitoring files enables security managers to get rid of corrupted files rapidly – which means the network can recover more quickly as well.

Figure2
Figure 2. Point-In-Time Detection vs. Cisco’s Continuous Detection

Another way that Cisco AMP sets itself apart from other security options is through its ability to trace a file’s path and remove other files it has potentially corrupted. The corrupted file is patient zero, but CiscoAMP can find every other patient it touched to ensure the threat is completed eradicated.

As DoD networks become increasingly complex, with more devices requiring access from remote areas, the capabilities Cisco AMP solutions provide will be even more important to ensure these critical networks are secure. No matter how it is utilized, Cisco AMP can help the Department of Defense and other public sector agencies defend their sensitive information from cyberattacks. Click here to learn more about Cisco AMP solutions.

Authors

Peter Romness

Cybersecurity Principal, US Public Sector CTO Office

Avatar

This post is authored by Andrea Allievi and Holger Unterbrink with contributions from Warren Mercer.

Executive Summary

Over the past year, Talos has devoted a significant amount of time to better understanding how ransomware operates, its relation to other malware, and its economic impact. This research has proven valuable for Talos and led the development of better detection methods within the products we support along with the disruption of adversarial operations. CryptoWall is one ransomware variant that has shown gradual evolution over the past year with CryptoWall 2 and Cryptowall 3. Despite global efforts to detect and disrupt the distribution of CryptoWall, adversaries have continued to innovate and evolve their craft, leading to the release of CryptoWall 4. In order to ensure we have the most effective detection possible, Talos reverse engineered CryptoWall 4 to better understand its execution, behavior, deltas from previous versions and share our research and findings with the community.  

For readers that may not be familiar, ransomware is malicious software that is designed to hold users’ files (such as photos, documents, and music) for ransom by encrypting their contents and demanding the user pay a fee to decrypt their files. Typically, users are exposed to ransomware via email phishing campaigns and exploit kits. The core functionality of CryptoWall 4 remains the same as it continues to encrypt users’ files and then presents a message demanding the user pay a ransom. However, Talos observed several new developments in CryptoWall 4 from previous versions. For example, several encryption algorithms used for holding users’ file for ransom have changed. Also, CryptoWall 4 includes a new technique to disable and delete all automatic Windows backup mechanisms, making it almost impossible to recover encrypted files without having an external backup. Finally, CryptoWall 4 has been observed using undocumented API calls not previously used to find the local language settings of the compromised host. These are just a few of the new findings Talos observed in the new iteration of CryptoWall that are detailed further in this post.

For our technically savvy users, we encourage you to continue reading. As always, we strongly encourage users and organizations to follow recommended security practices and to employ multiple layers of detection in order to reduce the risk of compromise. Our in-depth analysis of the latest CryptoWall version gives us a better opportunity to protect our users by allowing us to identify better detection methods. Finally, as a note regarding recent statements by the FBI informing users that they should just pay the ransom if they have no alternative, Talos strongly encourages users to not pay the ransom as doing so directly funds this malicious activity.

Read More >>

Authors

Talos Group

Talos Security Intelligence & Research Group

Avatar

With holiday shopping in full swing many of us are scrambling to buy that must-have toy, hot new gadget, or latest fashion trend. But shoppers aren’t the only ones striving to deliver just the right thing. There’s an entire supply chain working in lock-step to make sure the shelves are stocked with what you want, when you want it. A critical component of that supply chain is transportation management.

Transportation management company leader Transplace understands the challenges and is focused on putting systems in place that their customers can rely on to keep their goods safe and secure as they get to where they need to be when expected. Transplace also provides more than transportation management to its clients, offering intermodal, brokerage, international logistics services and software-as-a-service (SaaS) solutions. With all these great offerings, Transplace wants its customers to have complete peace of mind when it comes to their goods and the security of the goods and the systems they rely on.

Continue reading “Securing that Holiday Shopping List with Cloud Web Security”

Authors

Story Tweedie-Yates

Product Marketing Manager for Cisco Web Security

Security Business Group

Avatar

What an exciting year for data and analytics! As I think back on our 2015 accomplishments and also think about some of the predictions that were made for the year, I’m confident that Cisco data and analytics is right on track for doing big things in the future. Here are some of the 2015 major highlights I’d like to share.

Cisco Data Preparation

In December 2014, IDC predicted that, “Visual data discovery tools will be growing 2.5x faster than rest of the BI market; investing in this enabler of end-user self service will become a requirement for all enterprises by 2018.” Our team was ecstatic to see this prediction, as we were already hard at work on this amazing new product. Driven by business’s accelerating demand for analytics, Cisco Data Preparation (Data Prep) makes it easy for non-technical business analysts to gather, explore, cleanse, combine and enrich the data that fuels these analytics, all in a self-service application.

https://www.youtube.com/watch?v=FfOCyaWbpmw&list=PLFT-9JpKjRTDSyR4jbCVS5e94fzzhIzWz&index=1

Continue reading “The Data and Analytics Year in Review”

Authors

Kevin Ott

No Longer with Cisco

Avatar
Cisco's elves on telepresence.
Cisco’s elves on telepresence.

When a serious illness hits it hits hard, everything stalls, family life goes on hold. Routine is thrown in all directions. Calendars are no longer about days of the week and holidays, but rather they become consumed with appointments, treatment, surgery and long stays in hospital. Oftentimes seriously ill children must limit their interactions with general public by staying in an isolation ward.

It’s especially hard during the holidays, with everything going on outside, like holiday festivities and visits to Santa. During these times the tiniest of distractions can help.

Santa knows how important it is to fit everyone in, and he enlisted Cisco technology (and Cisco employees) to help. Through Cisco’s Telepresence and video collaboration technology children get one-on-one time over a live link chat with Santa in the North Pole, we call this Connected Santa. Children interact with Santa, they express their wishes, ask about Rudolf and the other reindeer, ask how the very busy Elves are getting on. It’s a real connection, a magical occasion, I mean, how does Santa know about their pets’ names or the funny stuff they got up to yesterday? There’s something about the reaction of wonder and amazement from the children as they look to their parents in awe asking “Mom, how did Santa know that?” Magic isn’t it!

Connected Santa Each year across 13 hospitals in Ireland and the UK around 350 children get to connect with Santa. An army of Cisco Elves get behind Santa & Mrs. Claus to help with the technology, organise toys, parties and getting Santa’s grotto ready. The Cisco Elves work from November all the way to December to volunteer with one goal in mind. That is to put a smile on the faces of these kids, their parents, and the staff at the hospitals.

This year was no different. The Cisco elves have made their rounds and helped Santa bring his jolly-ness to more children. They’ve helped in hospitals in Cardiff, Derby, Glasgow, Bristol and more. The kids have had their fun, and so have we. Here’s just a few of the things they asked for. (We want to protect their privacy, so only their initials are used.)

M. is three years old, and after having made a video singing “Let it Go” with her nurses, of course she wants anything having to do with Frozen. (That seems to be a popular request for Santa this year.)

Six-year-old N. wants a book. If Santa would also like to throw in a puppy, she’d be fine with that, too.

Three year old H. is a boy with a plan. He loves Minions. He wants all the Minions for his present.

E. didn’t tell us her age, but she did make sure to tell Santa that her 1-year old brother pulls her hair! She wants sparkly unicorns (who doesn’t?)

10-year-old J. told Santa to just surprise him.

I’ve been volunteering with the Connected Santa program for eight years now. It’s true to say that every volunteer has a heartfelt connection with the Connected Santa program. It’s a humbling experience and it sure puts everything in perspective. It makes us appreciate the holidays with our families even more, and just puts a feeling of hopefulness and cheer in our hearts that carries us onwards with jingle bells and a few sparkles on the side!

Come join us at Cisco.

Authors

Mairead Craven

Global Operations Manager

Talent Acquisition