Avatar

Kathy Trahan

Senior Security Solutions Marketing Manager

Global Marketing Corporate Communications

Kathy Trahan is a Senior Security Solutions Marketing Manager in the Product Solutions Marketing group for Security at Cisco. Kathy provides outbound marketing for the Secure Unified Access solutions. With more than 15 years of experience in high tech and IT Security, Kathy has held prior roles at Check Point, NetApp, Nokia, Sun Microsystems, Symantec and TrendMicro. She lives in San Jose, CA with her husband and two children.

 

Articles

May 5, 2014

SECURITY

The Continuum Approach for Secure Mobility

2 min read

A couple weeks ago, we spoke about the mobility journey and the phases that organizations take as they embrace the widely accepted mode of mobility—Beyond BYOD to Workspace Mobility (device-focus, application-focus and experience-focus). Whatever phase your organization is in, security is a top priority. These phases can help determine your secure mobility approach but your […]

April 1, 2014

SECURITY

The Security Imperative As Mobility Evolves

2 min read

Editor’s Note: This post is a response to EN Mobility Workspace. Please see that post for full context. A colleague of mine here at Cisco, Jonathan, recently spoke well to the Evolution of Cisco Mobility Workspace Journey. Like all technologies, there is an adoption and engagement cycle based on maturity and risk level. We begin […]

February 20, 2014

SECURITY

Secure Access for the Real World, Really?

2 min read

Yes, really. I just got back from Cisco Live! Milan where Chris Young, Senior VP at Cisco, spoke to the Cisco security story, Intelligent Cybersecurity for the Real World. The Cisco security strategy addresses many security challenges across a range of attack vectors (network, endpoint, mobile devices, cloud, or virtual). It covers the entire attack […]

February 5, 2014

SECURITY

Can You Guess Your ROI on Your Secure Access?

1 min read

Cisco commissioned Forrester Consulting to examine the business value and potential return on investment (ROI) enterprises may realize by implementing Cisco Identity Services Engine (ISE)—a leading secure access solution. This is available in the recently published Forrester TEI (Total Economic Impact) Research. Four customers were interviewed for this study and covered use cases for policy-governed, unified access across the following use case scenarios: guest services; BYOD; full access across wired, wireless, and VPN; and policy networking. The calculation was based on a composite organization of 10,000 employees that reflected the four interviewed customers from higher education, utilities, and financial services markets.

January 23, 2014

SECURITY

Security Realities of IoT (Internet of Things)

2 min read

Are you a security professional or IT professional just resolving the security issues with BYOD (bring-your-own-device)? Watch out, BYOD was a precursor or warm up exercise to the tsunami just hitting your shores now. The SANS Institute just completed a survey on the security viewpoints on IoT, predominantly with security and IT professionals. 78% of […]

January 9, 2014

SECURITY

2014: More Secure Access, Please

1 min read

Are you back from holiday break all refreshed and ready to embrace 2014 with confidence? Many organizations will see new devices on their networks given the recent massive holiday gift giving. In particular, educational organizations will be morst likely to be impacted. It seems there was no new hot toy (must-have gift) noted this year […]

December 18, 2013

SECURITY

Beware: Insider Threats Getting Worse

1 min read

Most recently ESG/Vormetric came out with a threat report that highlighted the increase in insider threats & the significance to augment perimeter and host-based security. The rationale behind the increase was that more people are accessing the network, increase cloud and network traffic are making it difficult to isolate the problem. Almost 50% of the […]

November 4, 2013

SECURITY

Education Embraces the Mobility Excitement

1 min read

Let’s examine and consider mobile devices in education. Students need to become more tech savvy to compete in today’s economy, and mobile devices offer supplemental learning and a new style to learn. A recent report noted that educators see great potential in mobile technology for transforming learning. The most commonly expected and desired benefits are […]

October 14, 2013

SECURITY

A Financial Service Organization Speaks Out on Secure Access

1 min read

Are your finances secure with your financial institution? Vystar Credit Union in Florida, USA speaks out on one of their recent efforts to ensure highly secure access at their institution. With the pressures of compliance and the need to protect their institution’s network and assets, Vystar deploys ISE and AnyConnect with great success. Most recently […]

August 27, 2013

NETWORKING

[Summary] How Secure Is Your Mobile Worker?

1 min read

Let’s start with how well do you know your mobile worker?  Understanding the mobile worker’s perceptions and behaviors will offer a better view on the potential security implications your organization must manage.  Cisco just released new global research (white paper) , Cisco Connected  World International Mobile Security study, that explores the mobile worker’s view points […]

August 22, 2013

SECURITY

How Secure is Your Mobile Worker?

2 min read

How well do you know your mobile worker? Understanding the mobile worker’s perceptions and behaviors will offer a better view on the potential security implications your organization must manage. Cisco recently released a new global infographic and white paper, the Cisco Connected World International Mobile Security study. They explore the mobile worker’s view points concerning […]

July 30, 2013

SECURITY

How Secure is Your Secure Access?

1 min read

In June, I attended the Gartner Security Summit in Washington, D.C. where I was asked by quite a few security executives, “My network folks just bought ISE, but what is ISE and what type of security does it provide?”  Fast forward to July, and I wish I had this SANS review on ISE to offer […]

May 7, 2013

SECURITY

Shedding More Light on MDM

1 min read

Starting with a primer on MDM, Networking 101: MDM, Jimmy Ray answers the questions on what is MDM and what can it do for my organization in his entertaining and educational white board approach.

April 4, 2013

SECURITY

Securing a BYOD Environment Requires Deployment Flexibility

3 min read

When Cisco integrated our Identity Services Engine (ISE) platform with leading mobile device management (MDM) systems, it was clear from the start that we had struck a chord among IT administrators trying to wrestle with the onslaught of employee-owned mobile devices accessing their networks. First and foremost for IT organizations was gaining visibility to all mobile devices — rogue or authorized — that were present on the wireless network. Cisco ISE delivered that capability, providing IT staff with a detailed view of what types of mobile devices were on the network. Coupling that with ISE's native BYOD enrollment capabilities or the active management capabilities of MDM platforms — as well as network intelligence from the Cisco Wireless Network — was key to gaining full control over this Wild West of mobile devices

February 28, 2013

SECURITY

Consider Mobile Work Patterns and Security Impact

Mobility and application access capabilities have encouraged many of today’s work patterns. Some work behaviors were recently noted in a Cisco-commissioned research report on mobility and BYOD comparing IT and end...

February 11, 2013

SECURITY

Securing Any Device—For the Exceptional Connected Experience

Secure access continues to be paramount for a connected world. People connect to the Internet for business and for personal use, from wired, wireless or mobile devices—locally and remotely. The Internet is a global system of interconnected networks. User devices, the Internet, and all computer networks are the target of a growing number of increasingly complex […]

December 11, 2012

SECURITY

The Power of Mobility & Learning

1 min read

The mobility trend holds great promise for improved productivity and new engagement models. These are most powerful in a learning effort—imagine learning anywhere and anytime. I just wish I had the Internet and the mobility that students have today when I went to school. Yet, mobility is an IT tsunami that will not recede. One […]