security

July 11, 2016

NETWORKING

Cisco Umbrella Branch: the Fastest, Easiest Security for Branches

1 min read

As an organization, providing secure guest and corporate Internet access at the branch can be a major challenge. Not only do you have to protect the enterprise, you also have to protect your customer. Protection is good… but it also needs to be simple to deploy, easy to manage, and integrates seamlessly. Let’s also not […]

July 1, 2016

PARTNER

Partner Rewind and Fast Forward

2 min read

Knock knock. Who’s there? Muffled reply. Sounds serious. Do you open your door? Hackers hope so.   This week we’re talking about: Security, security, security: what’s new and what does it mean to you? Your value proposition. Does it stand out? Or does it sound like everyone else’s?   Hackers are knocking at your door. […]

June 30, 2016

CLOUD

Red Hat Keynote Open Source: the Forefront of Innovation

1 min read

Though a long time IT guy and Cisco veteran, when it comes to Open Source, containers, really the future of data centers – I’m a newbie!  However, this has got to be one of the coolest times to enter this field. In the Red Hat Summit keynote session, Open Source: The Forefront of Innovation, I […]

June 28, 2016

EXECUTIVE PLATFORM

Cisco to Expand Cloud Security Portfolio with Acquisition of CloudLock

1 min read

I’m excited to share that today Cisco announced its intent to acquire CloudLock Inc., a leading cloud security solution that gives companies visibility and policy control over content shared in cloud applications. CloudLock specializes in Cloud Access Security Broker, or CASB, technology and helps organizations move faster to the cloud. CloudLock delivers cloud security to […]

June 27, 2016

DATA CENTER

Micro Segmentation and Cisco ACI – From Theory to Practice Part II

6 min read

This is Part II in a four part series of blogs.  This is the second of a series of blogs where we will illustrate how to leverage Cisco ACI to implement Micro Segmentation. In the first blog we described how to use ACI micro segmentation to implement a web application that uses a tier of […]

June 20, 2016

MANUFACTURING

Your Guide to Manufacturing at Cisco Live

1 min read

Check out the top Manufacturing demos and sessions you won’t want to miss at Cisco Live.

June 17, 2016

DATA CENTER

Visibility Into Tetration Analytics, Part 2

4 min read

These 5 key use cases illustrate how Tetration Analytics provides pervasive visibility in your data center -- and demonstrate why we call it a Data Center Time Machine.

June 16, 2016

DATA CENTER

Visibility Into Tetration Analytics, Part 1

4 min read

What is Tetration Analytics, what problems will it solve, and how does it work? This is the first of a two part series.

June 14, 2016

SECURITY

Advanced Malware Evasion Techniques HTTP-Evader

1 min read

Malware doesn’t play by the rules, so today’s IT infrastructure needs to provide several layers of defense for end-users.  Some of the more common devices used to protect modern networks are Intrusion Prevention systems (IPS) and Firewalls. In recent years, there has been a lot of research on how evasion techniques bypass Intrusion Prevention systems […]