security
Cisco Umbrella Branch: the Fastest, Easiest Security for Branches
1 min read
As an organization, providing secure guest and corporate Internet access at the branch can be a major challenge. Not only do you have to protect the enterprise, you also have to protect your customer. Protection is good… but it also needs to be simple to deploy, easy to manage, and integrates seamlessly. Let’s also not […]
Partner Rewind and Fast Forward
2 min read
Knock knock. Who’s there? Muffled reply. Sounds serious. Do you open your door? Hackers hope so. This week we’re talking about: Security, security, security: what’s new and what does it mean to you? Your value proposition. Does it stand out? Or does it sound like everyone else’s? Hackers are knocking at your door. […]
Red Hat Keynote Open Source: the Forefront of Innovation
1 min read
Though a long time IT guy and Cisco veteran, when it comes to Open Source, containers, really the future of data centers – I’m a newbie! However, this has got to be one of the coolest times to enter this field. In the Red Hat Summit keynote session, Open Source: The Forefront of Innovation, I […]
Cisco to Expand Cloud Security Portfolio with Acquisition of CloudLock
1 min read
I’m excited to share that today Cisco announced its intent to acquire CloudLock Inc., a leading cloud security solution that gives companies visibility and policy control over content shared in cloud applications. CloudLock specializes in Cloud Access Security Broker, or CASB, technology and helps organizations move faster to the cloud. CloudLock delivers cloud security to […]
Micro Segmentation and Cisco ACI – From Theory to Practice Part II
6 min read
This is Part II in a four part series of blogs. This is the second of a series of blogs where we will illustrate how to leverage Cisco ACI to implement Micro Segmentation. In the first blog we described how to use ACI micro segmentation to implement a web application that uses a tier of […]
Your Guide to Manufacturing at Cisco Live
1 min read
Check out the top Manufacturing demos and sessions you won’t want to miss at Cisco Live.
Visibility Into Tetration Analytics, Part 2
4 min read
These 5 key use cases illustrate how Tetration Analytics provides pervasive visibility in your data center -- and demonstrate why we call it a Data Center Time Machine.
Visibility Into Tetration Analytics, Part 1
4 min read
What is Tetration Analytics, what problems will it solve, and how does it work? This is the first of a two part series.
Advanced Malware Evasion Techniques HTTP-Evader
1 min read
Malware doesn’t play by the rules, so today’s IT infrastructure needs to provide several layers of defense for end-users. Some of the more common devices used to protect modern networks are Intrusion Prevention systems (IPS) and Firewalls. In recent years, there has been a lot of research on how evasion techniques bypass Intrusion Prevention systems […]