it security

July 15, 2020

CISCO SERVICES (CX)

How to Invest in a Resilient Remote Workforce

As the world goes through extraordinary change, the rapid shift to remote work is revolutionizing how businesses compete. Learn how to strengthen your organization’s capacity to work remotely, and improve your long-term business resiliency.

October 26, 2015

SECURITY

Active Threat Analytics: Easing the Burden of Threat Management

In Greek mythology, Sisyphus was a trickster king cursed with the eternal torment of fruitless labor. As punishment for his hubris and wile, Zeus condemned this hapless figure to the unending task of pushing a boulder up a mountain. Once he reached the top, the boulder would fall back down. And he would begin again. […]

June 22, 2015

PERSPECTIVES

Remembering the small things: IT Security

There are many tasks and responsibilities of the (lone) IT sysadmin, they are sometimes varied, sometimes monotonous.  We know what they are without thinking about them, as if they are unwritten commandments, specific to the IT world. Security has featured greatly in the world news over the past few years, and even more so within […]

March 5, 2014

INSIDE CISCO IT

Cisco IT’s Identity Services Engine Deployment: First Capabilities to Roll Out

Cisco IT is deploying Identity Services Engine (ISE) globally. ISE is a security policy management and control platform that automates and simplifies access control and security compliance for wired, wireless, and VPN connectivity. We’re running ISE 1.2 Patch 3 globally and evaluating Patch 5 for its guest networking enhancements. Over the next few months, I’d […]

January 31, 2014

DATA CENTER

Securing Cloud Transformation through Cisco Domain Ten Framework v2.0

Businesses of all sizes are looking for Cloud solutions to solve some of their biggest business and technology challenges—reducing costs, creating new levels of efficiency, transform to create agile environment and facilitate innovative business models. Along with the promise of Cloud comes top concern for Security. With rise of applications, transactions and data in the Cloud, […]

June 14, 2013

DATA CENTER

Three Data Center Security Innovations to Accelerate Your Business

How can you get your data center off to a smooth start? At the Gartner Security & Risk Management Summit this week, I presented three data center innovations that hold the key to accelerating business securely. Ease of provisioning According to a recent Cisco IT case study, data center provisioning times have decreased from eight weeks […]

June 13, 2013

DATA CENTER

Everything’s in the Cloud: Now What?

Today’s applications are either virtualized in our own data center or being hosted by any number of providers. But is our security built around our current security reality or is it living in the past? During one of my Gartner Security & Risk Management Summit presentations, I shared best practices in a rapidly changing environment, […]

March 4, 2013

SECURITY

Ask the Data Center Expert: Trends in Latin America

I have a keen interest in the Latin American region because several of my closest friends and my respected colleagues are from this region. Also, internal market forces and global demand are accelerating the rate of data center projects, further heightening my interest. Last year, I visited the region where I got to see data […]

January 30, 2013

SECURITY

Streamline Your Data Center with Three Key Optimized Security Measures

We’ve just authored a white paper on three must-have security measures that focuses on pivotal tactics and controls required for safe data center innovation. We’ve focused on controls that will enable security to be adaptive and responsive, enable users to securely access applications they need, and secure boundaries while demarcating between physical, virtual and cloud services. The goal of this white paper is to highlight three simple measures needed to take full advantage of security as a programmable element of the data center fabric. These measures leverage a design architecture that Cisco uniquely provides and that allows security to be easily built in at the design phase rather than being bolted on post implementation.