Avatar

Kathy Trahan

Senior Security Solutions Marketing Manager

Global Marketing Corporate Communications

Kathy Trahan is a Senior Security Solutions Marketing Manager in the Product Solutions Marketing group for Security at Cisco. Kathy provides outbound marketing for the Secure Unified Access solutions. With more than 15 years of experience in high tech and IT Security, Kathy has held prior roles at Check Point, NetApp, Nokia, Sun Microsystems, Symantec and TrendMicro. She lives in San Jose, CA with her husband and two children.

 

Articles

January 26, 2015

SECURITY

Secure Remote Access During Holidays

2 min read

In many parts of the world there was a holiday period and celebration of the New Year, and it reminds me that the world has holiday periods all year round. What happens to your remote access demands during holidays? One would think that being on holiday means no one needs access to corporate resources, correct? […]

November 21, 2014

NETWORKING

Insights for Remote Mobility

1 min read

Your mobile strategy needs to consider the user’s point of view and the highly dynamic nature of the mobile threat landscape.  Weighing the threat risk includes evaluating the cost of insecure mobile devices. User Point of View The Cisco 2014 Connected World Technology Research tracked the users’ outlooks on the evolving work environment.  Being mobile, […]

November 14, 2014

SECURITY

Minimize Threats from Non-Corporate Mobile Apps

2 min read

Our customers are continuing to feel the pain of having to increasingly support off-premise mobile devices like smartphones and tablets. The critical need to rapidly onboard these devices to connect to corporate services and applications pretty clearly provides business with a  competitive advantage (Cisco Enterprise Mobility Landscape Wave II Study – April 2014) in improving […]

September 4, 2014

SECURITY

Securing Mobile Data in the Event of Device Loss or Theft

4 min read

As a business or technical leader, you know you need to protect your company in a rapidly evolving mobile ecosystem. However, threats are not always obvious. As malware and attacks become more sophisticated over time, business decision makers must work with technical decision makers to navigate security threats in a mobile world. This blog series, […]

August 21, 2014

SECURITY

Security Compliance is Necessary for Real-Time Mobile Data Access

5 min read

As a business or technical leader, you know you need to protect your company in a rapidly evolving mobile ecosystem. However, threats are not always obvious. As malware and attacks become more sophisticated over time, business decision makers must work with technical decision makers to navigate security threats in a mobile world. This blog series, […]

July 24, 2014

SECURITY

Securing Mobile Data: What’s Your Plan?

1 min read

As a business or technical leader, you know you need to protect your company in a rapidly evolving mobile ecosystem. However, threats are not always obvious. As malware and attacks become more sophisticated over time, business decision makers must work with technical decision makers to navigate security threats in a mobile world. This blog series, […]

July 22, 2014

NETWORKING

Your Network: Well-Kept Secret for Your Protection?

1 min read

In my discussions with security executives who gathered at the recent Gartner Security Summit they recognized that unsecured access to the network is a critical threat vector.   However, when leveraged properly, the network itself also provides a significant platform that offers comprehensive protection to close those gaps. What does this mean?

July 17, 2014

SECURITY

The Risk of Remote Connection: What’s Your Plan?

4 min read

As a business or technical leader, you know you need to protect your company in a rapidly evolving mobile ecosystem. However, threats are not always obvious. As malware and attacks become more sophisticated over time, business decision makers must work with technical decision makers to navigate security threats in a mobile world. This blog series, […]

July 8, 2014

SECURITY

The Expanding Burden of Security

2 min read

[ed. Note: This post was updated 7/9/2014 to include new information not available to the author at the time of original publishing] I just returned from the Gartner Security Summit at the Gaylord Resort in National Harbor Maryland. Each morning I took my run along the Potomac River and passed this sculpture of a man […]