Cybersecurity on Unscripted
I never realized how many IoT devices were in my own home until a little incident prompted me to change the password for our ‘parental’ wireless network.
Encrypted Traffic Analytics: Explained on TechWiseTV
How many security challenges are still considered intractable? How easy does it become to start accepting things as status quo when we really should always be asking some form of 'why not?' I am thankful for the many unknown researchers deep within our company that asking hard questions because sometimes we get great answers. This is one of those rare stories.
What is an Intuitive Network?
How well do you understand what Cisco just announced? If you are the slight bit technical or just curious what the reality is behind all the grand talk...check out these shortcut videos from TechWiseTV.
TechWiseTV dives into Enterprise Service Automation and Easy QoS
In this episode, Cisco’s Prakash Rajamani demonstrates how orchestration tools like Enterprise Service Automation (ESA) can bring repeatable, consistent, and scalable processes to your virtualized branch deployment. Later, Ramit Kanda shows a dramatically simple way that ESA can be used to control QoS on your network: from wired to wireless, and through the WAN.
Cisco and Apple: Understanding the Innovation
To fully appreciate what these two industry leaders have accomplished, I thought it would be helpful to pull back the covers a bit, and level set on how things are usually done. This can help highlight where and how these tweaks can improve your own enterprise experience.
TechWiseTV: Indoor Location Accuracy, a World of Possibility
Accurate tracking of people or objects inside of a building is not as easy as it may seem. There are a lot of factors at play...but thankfully, there are also a lot of solutions. Make sure you understand the benefits and the trade-offs, so you can maximize the Opportunity Inside.
Stealthwatch Learning Network License: The Workshop
Get an inside look at how Stealthwatch Learning Network License can transform your branch network router into a powerful security sensor and enforcer: one capable of quickly detecting threat activity and mitigating attacks, with little to no hands-on management needed.
Integration: The Civilized Approach to Securing Your Branch
We demonstrate two different scenarios: An anomaly that turns out to be an FTP file transfer we didn’t expect, and an unusual spike in traffic. In both cases, what blew me away was how easy it was to understand what was truly going on, and how simple it was to take action.