Articles
Cisco Scores BIG With A New IETF-Approved Internet Standard
2 min read
This June, Cisco achieved a historic milestone when the Internet Engineering Task Force (IETF) declared our XMPP-Grid architecture an official Internet standard for security information exchange.
2018 Forrester TEI Study Reveals Stealthwatch + ISE provide 120% ROI
2 min read
With digital transformation unlocking unprecedented value for today’s businesses and consumers, the key to success is arguably predicated on speed: Whoever is the fastest to enter new markets; the fastest...
Improving Cybersecurity in Healthcare Part II: Control
4 min read
The Internet of Things (IoT) is ushering in an exciting digital renaissance that is redefining the traditional models of how healthcare is delivered. With IoT devices such as smart infusion pumps or connected inhalers, healthcare providers can now remotely monitor and adjust care. IoT devices in healthcare, where mobile and wearable devices are increasingly connected […]
Here Are 3 Things that Drive Security for the Intuitive Network
3 min read
Hint: ISE 2.3 Plays Key Role We recently announced the Network Intuitive architecture, a new era of networking that removes complexity and enables automation, assurance, and security. With built-in...
Improving Cybersecurity in Healthcare: Visibility
3 min read
Imagine going to the doctor for a routine checkup. After greeting you, the physician pulls up your medical records on his tablet, but instead of your medical history, this screen pops up: Now imagine if you were waiting on the results of a biopsy, or if the ultrasound machine displayed this screen instead of your […]
Enterprise Network Security: Is it in your DNA?
3 min read
With new capabilities on ISE and TrustSec, Cisco is now the first in the industry to deliver software-defined segmentation - from the network to the endpoint to the cloud - with complete application visibility.
Protecting the Crown Jewels
2 min read
Why do so many organizations maintain essentially open, “flat” networks, leaving thousands of users and devices with network-layer reach to their “crown jewels”? Especially in light of what we know with data breaches, theft, and loss? One possibility may be that some organizations simply grew too quickly, and the tools in the tool chest to […]
3