effective security

January 31, 2018

SECURITY

Better design for simpler, more effective security

2 min read

Few will contest the notion that security is complex. Evolving threats.  Clever, motivated attackers.   And all too often, vendor-inflicted complexity of managing security from the mismatched consoles from dozens of...

June 23, 2017

SECURITY

A Steady Drumbeat for Simple, Open and Automated

2 min read

I continue to beat the drum for solutions that are simple, open, and automated because it’s something I’m passionate about and Cisco Security is deeply committed to. It’s the clear path forward to security as a force multiplier – helping you to improve your security posture with your existing resources. In March, I gave a […]

June 2, 2017

SECURITY

Less is More – Fewer Cybersecurity Vendors Yield More Effective Security

3 min read

A traditional, tactical approach to security -- encounter a new threat, buy another box -- usually results in a complex security “frankenstructure” of products. Cisco delivers greater simplicity and automation.

February 22, 2017

SECURITY

Cisco Firepower 2100 Series Delivers Business Resiliency and Effective Security with a New Architectural Approach

2 min read

Business resiliency is job one for network operations teams. With our latest Firepower 2100 Series NGFWs, Cisco is helping our customers maintain network performance while they keep their data safe.

January 20, 2017

SECURITY

Effective Endpoint Security – More than Meets the Eye

4 min read

One of your sales people, Susan, is on the road putting some finishing touches on a presentation before a big meeting. Using the hotel Wi-Fi she does a quick search to see if there’s any relevant company or industry news she needs to know about before meeting with the client. She clicks on several websites, […]

December 19, 2016

SECURITY

To be Effective, Security Needs to Be a Force Multiplier

4 min read

Effective security is simple, open, and automated.  We’ve already talked about simple and open. Now let’s talk about automated. Security admins can relate to this scenario. You just learned of an infected system in your environment of thousands of devices. How many others are affected? That’s hard to figure out even in elite operations. What […]