Security with Privacy – Solving the encryption problem without decryption
Cisco has also developed several mechanisms in core network infrastructure and services to help organisations detect threats and enforce AUP without breaking applications and user privacy.
Industrial Security and the Art of Defense
Sun Tzu's the Art of War is a famous book known for insights from the Chinese philosopher with a guided focus on leadership, strategy and military theories. While the book...
Setting the standard: Cisco ISE wins trust award for best NAC solution at SC Awards 2018
Many professional athletes would say that while winning the first championship is unforgettable, its winning back-to-back championships—or even accomplishing the rare three-peat—that carries special meaning as it requires an enduring...
Game Time Decision. Security or Innovation?
When it comes down to the decision of picking between network security or innovation it may seem like you are stuck between a rock and a hard place.
ISE: Transforming your siloed security apparatuses into a cohesive security network
A long time ago, when I was a CISO at a large Service Provider, I was ingrained early and often about the concept of “security rings”. Unlike the common belief...
2018 Forrester TEI Study Reveals Stealthwatch + ISE provide 120% ROI
With digital transformation unlocking unprecedented value for today’s businesses and consumers, the key to success is arguably predicated on speed: Whoever is the fastest to enter new markets; the fastest...
Improving Cybersecurity in Healthcare Part II: Control
The Internet of Things (IoT) is ushering in an exciting digital renaissance that is redefining the traditional models of how healthcare is delivered. With IoT devices such as smart infusion pumps or connected inhalers, healthcare providers can now remotely monitor and adjust care. IoT devices in healthcare, where mobile and wearable devices are increasingly connected […]
Fireproofing your network with software-defined segmentation
We often hear of the many challenges of the industrial revolution, but one of the scourges of this time period that often goes unmentioned was mass fires. To the people of the time, great fires threatened the very viability of industrialization. The number of fires bearing the moniker ‘great’ helps prove this point: The 1835 […]
Do you trust the endpoints connecting to your network?
Trust gets a bad rap in the security industry, but in reality, it’s a necessary part of any relationship. Without trust, today’s organizations couldn’t function, and productivity would come to a screeching halt. The thing is – how do you know that the devices coming onto your network are trustworthy? We already verify user access […]