ISE

September 10, 2019

NETWORKING

Business Benefits of Segmentation with Software-Defined Access

Cisco Software-Defined Access (SD-Access), working at the controller plane level, reduces complexity and improves scalability and mobility of devices—and your workforce.

November 20, 2018

SECURITY

MobileIron UEM Certified as Cisco Security Connector Compatible

MobileIron was one of the first integration partners with Cisco Security Connector (CSC) for supervised iOS devices.

August 26, 2018

SECURITY

Protecting SugarCreek’s 24/7 Food Manufacturing Across Four States

SugarCreek Brandworthy food solutions is a growing, mid-western food manufacturer helping some of the industry’s largest and best-known companies develop innovative food solutions.

August 1, 2018

NETWORKING

Shining a Light on Shadow IT

Shadow #IT projects will continue to take root and proliferate throughout enterprise #networks.

#SHOWMESECURITY: Protect Network Assets with a Security Strategy

CCI’s Security Solution Director, Andy Erickson, gives a brief re-cap on the recent NTCA IP Vision event happening in St. Louis, MO. Much of the event’s conversations focused on cybersecurity and taking the next steps towards protecting network assets.

February 28, 2017

PERSPECTIVES

#CiscoChampion Radio, S4|Ep. 2: Security and ASICs

#CiscoChampion Radio is a podcast series by Cisco Champions as technologists. Today we’re discussing Security and ASICs. Get the Podcast Listen...

December 19, 2016

SECURITY

To be Effective, Security Needs to Be a Force Multiplier

Effective security is simple, open, and automated.  We’ve already talked about simple and open. Now let’s talk about automated. Security admins can relate to this scenario. You just learned of an infected system in your environment of thousands of devices. How many others are affected? That’s hard to figure out even in elite operations. What […]

December 1, 2016

HEALTHCARE

Protecting Clinical Devices – the Achilles Heel of Healthcare

Everyday, hackers and cybercriminals are infiltrating networks. And they are especially interested in healthcare. That’s because stolen medical records are profitable, selling up to 10 times more than credit card numbers on the black market. But even more lucrative than identity theft is a ransomware attack. Cyber criminals can charge a hospital millions to unlock […]