Shining a Light on Shadow IT
Shadow #IT projects will continue to take root and proliferate throughout enterprise #networks.
#SHOWMESECURITY: Protect Network Assets with a Security Strategy
CCI’s Security Solution Director, Andy Erickson, gives a brief re-cap on the recent NTCA IP Vision event happening in St. Louis, MO. Much of the event’s conversations focused on cybersecurity and taking the next steps towards protecting network assets.
#CiscoChampion Radio, S4|Ep. 2: Security and ASICs
#CiscoChampion Radio is a podcast series by Cisco Champions as technologists. Today we’re discussing Security and ASICs. Get the Podcast Listen...
To be Effective, Security Needs to Be a Force Multiplier
Effective security is simple, open, and automated. We’ve already talked about simple and open. Now let’s talk about automated. Security admins can relate to this scenario. You just learned of an infected system in your environment of thousands of devices. How many others are affected? That’s hard to figure out even in elite operations. What […]
Protecting Clinical Devices – the Achilles Heel of Healthcare
Everyday, hackers and cybercriminals are infiltrating networks. And they are especially interested in healthcare. That’s because stolen medical records are profitable, selling up to 10 times more than credit card numbers on the black market. But even more lucrative than identity theft is a ransomware attack. Cyber criminals can charge a hospital millions to unlock […]
How Cisco ISE Customers Saved Over $17 Million
Today, thousands of Cisco customers are using the Identity Services Engine for guest and BYOD access. Naturally they want their users to have a great experience with great looking portals that’s consistent with their company brand. Custom portal creation typically requires technical and design expertise that’s scarcer than you would think. That can put IT […]
Kuwait Oil Company Gets More Secure
To protect themselves from attacks, Kuwait Oil Company turned to Cisco to help manage who accesses their network, where they access it, and on what devices with centralized policy management.
ISE Express Packs the Best Price with the Best Performance
You just set up your entire network using Cisco products and it was incredibly easy. But now you have a question: how do you make sure that your network and your data stays secure? Certainly the safeguard for running security must be time-consuming to set up, a bear to maintain and incredibly expensive. How about […]
If you’re transforming to digital you’d better have integrated security. Here’s why.
So you’re transforming to a digital network. Are you thinking your current security technologies are going to work? You might want to think twice, because all those new mobile and IoT devices on your network get infected with advanced threats pretty easily. And your old defenses probably aren’t as good at stopping them. That’s probably […]