Cisco Firepower

August 7, 2015

NETWORKING

Branch Direct Internet Access: is your branch office secure?

3 min read

With the recent launch of FirePower Threat Defense on Cisco 4000 Series Integrated Services Routers, I would like to spend some time talking about enterprise branch security and...

June 24, 2015

PERSPECTIVES

Like Chalk and Cheese: Cisco ASA 5506-X with Release 9.4.1 – Policy Based Routing

1 min read

Earlier this Year, Cisco introduced the Cisco ASA 5506-X with FirePOWER Services. This Model should replace the successful and smallest Security...

June 8, 2015

NETWORKING

“Security Everywhere” – Enterprise Branch Security for Direct Internet Access

2 min read

Two weeks ago, a leading global medical device manufacturer came to Cisco for advice. In an effort to streamline IT operations and reduce operating costs, the customer had recently migrated...

June 8, 2015

NETWORKING

The Network as a Security Sensor and Enforcer

3 min read

The Digital Economy and the Internet of Everything means everything is now connected. Digitization is fundamentally transforming how we conduct business. It creates new opportunities to develop services...

May 6, 2015

SECURITY

Industrial Cybersecurity and Service Delivery Don’t Need to Be Mutually Exclusive

2 min read

Industrial control system (ICS) operators and owners have found themselves in an unenviable position. Once air-gapped, serial-based critical industrial control systems are now becoming more and more connected. And while...

April 30, 2015

DATA CENTER

ESG Survey of IT Security Professionals Provides Insight to Data Center Security Issues

4 min read

Yesterday, I reported on Cisco’s new ACI security announcements and an overview of our secure data center strategy. Today, I wanted to share some interesting market...

April 29, 2015

DATA CENTER

Enhance Data Center Security and Automation with New Cisco ACI Features and Partners

3 min read

We’ve been talking for a while about Cisco ACI’s leadership in SDN security features (like here), and in the design of our fine-grained security policy enforcement between individual workloads,...