Extending control and advanced threat protection for web security
Today the web is a favorite vector for threat actors to launch their attacks. According to the Cisco 2014 Midyear Security Report, More than 90 percent of customer networks observed in the first half of 2014 were identified as having traffic going to websites that host malware. More recently, Talos uncovered a massive malvertising network known […]
New White Paper from Enterprise Strategy Group on the Evolution of and Need for Secure Network Access
Mention Network Access Control (NAC) to some security or network operations engineers, and they just might grimace. Why? Most people still associate NAC with a set of technologies that were complicated to deploy and implement effectively. Today, however, those nightmare assumptions are far removed from the reality. In this newly released white paper, Jon Oltsik, […]
Cisco Identity Services Engine (ISE) Further Expands Technology Partner Ecosystem
It’s the 25th anniversary of the film Field of Dreams, the movie about an Iowa farmer who hears a whisper that says, “If you build it, he will come.” Given the need for control with context for secure access initiatives, we did build it–and they have come. After its introduction last year, momentum has continued […]
Greater Dynamic Controls for Secure Access and Mobility
Businesses today are required to meet multiple challenges with respect to connecting users to applications. First, it is no secret that the demands of employees and users are great–they expect access to enterprise resources and their work via more mediums than ever before–by personal laptops, tablets and smartphones, both at home and on the road. […]
#CiscoChampion Radio S1|Ep 24 Identity Services Engine (ISE)
#CiscoChampion Radio is a podcast series by Cisco Champions as technologists. Today we’re talking about Identity Services Engine (ISE) with Cisco Program Manager (Cisco IT, Security) Greg Rasner. Lauren Friedman (@Lauren) moderates and Travis Newshott and Brandon Carroll are this week’s Cisco Champion guest hosts. Listen to the Podcast. Learn about the Cisco Champions Program HERE. […]
Secure Access for the Real World, Really?
Yes, really. I just got back from Cisco Live! Milan where Chris Young, Senior VP at Cisco, spoke to the Cisco security story, Intelligent Cybersecurity for the Real World. The Cisco security strategy addresses many security challenges across a range of attack vectors (network, endpoint, mobile devices, cloud, or virtual). It covers the entire attack […]
Inside Cisco IT Takes You on Our Security Journey
Would you jump on a horse without consulting someone else who is at least somewhat familiar with horses? You know, like a cowgirl or boy? Probably not. At least not if you’re interested in staying in the saddle versus tumbling to the never-soft earth. While Cisco IT doesn’t have any expertise in horseback riding (I […]
[Summary] How Secure Is Your Mobile Worker?
Let’s start with how well do you know your mobile worker? Understanding the mobile worker’s perceptions and behaviors will offer a better view on the potential security implications your organization must manage. Cisco just released new global research (white paper) , Cisco Connected World International Mobile Security study, that explores the mobile worker’s view points […]
How Secure is Your Mobile Worker?
How well do you know your mobile worker? Understanding the mobile worker’s perceptions and behaviors will offer a better view on the potential security implications your organization must manage. Cisco recently released a new global infographic and white paper, the Cisco Connected World International Mobile Security study. They explore the mobile worker’s view points concerning […]