A Guide for Encrypted Traffic Analytics
Learn about Encrypted Traffic Analytics, Cisco’s latest innovation that allows organizations to leverage the network to find threats in encrypted traffic.
Learn about Encrypted Traffic Analytics, Cisco’s latest innovation that allows organizations to leverage the network to find threats in encrypted traffic.
How well do you understand what Cisco just announced? If you are the slight bit technical or just curious what the reality is behind all the grand talk...check out these shortcut videos from TechWiseTV.
There’s never been a better time to do something amazing. Within Cisco’s Digitization office (CDO) we are living this every moment and embracing this mantra as part of everything we...
Today is the 17 year anniversary of my first video download. In September 1999, I was so excited to use the new robust 802.11a for an incredible 11 mbps download. Do you remember wireless networking 1999? Back then, if you had challenges at 11 mbps to
We had a busy week around the middle of July with ChefConf 2016 (Austin, Texas July 11 – 13) and Cisco Live US (Las Vegas, Nevada July 10 – 14). Now we’re moving on to AnsibleFest July 28 San Francisco where Cisco is a Gold sponsor as well as a
When I talk to network professionals, I routinely ask them about the one part of their job that keeps them up at night. The thing that consistently comes up is their network speed required for delivering a consistent reliable user experience: or
In a recent post, we discussed Dimension Data’s 6th Network Barometer Report and its recommendations. Detailed in this exhaustive report, Dimension Data has found that 32% – about 1/3 – of all Service incidents are related to Human
It is clear being an IT professional today is not easy, there are ever increasing demands on the network and on IT resources. Just look at some of the data out there: According to a report posted on Information Age 70% of businesses say that IT
Do you feel that you’ve been hearing a lot about data breaches lately? You are right! Take a look at the chart below. There is plenty of time left in September, but the data breach calendar is already filled with victim names. And August? I don’t even