security

September 28, 2014

HEALTHCARE

The Dynamic Protective Shield of Big Data Analytics

2 min read

As we think of Healthcare and Big data Analytics, some of the topics that come to fore front are personalized medicines, managing readmissions, identifying health risk indexes and many more. While each of these is important areas that benefit from power of Big Data Analytics, one of the areas that is at table stakes in […]

September 25, 2014

SECURITY

Looking Forward to Cisco’s Internal Security Conference: SecCon 2014

1 min read

Cisco’s internal security conference (SecCon) is just around the corner and this year marks our seventh anniversary! In previous years SecCon participants heard from a renowned privacy specialist, a Chief Security Officer from a large customer, a cyber security coordinator for two U.S. Presidents, and a self-described gentleman thief. This year we are delighted to […]

September 23, 2014

DATA CENTER

New CSA Survey Highlights Opportunities for Data Privacy Harmonization Across Cloud, IoT and Big Data

1 min read

Responses in a recent Cisco-sponsored Cloud Security Alliance survey (hyperlink) illustrate that many data privacy challenges previously cast in the  “too hard” basket can be more readily navigated though focusing on universal principles across Cloud, IoT and Big Data.  Survey responses showed a surprisingly strong level of interest in a global consumer bill of rights […]

September 23, 2014

EXECUTIVE PLATFORM

Cisco Security Leadership Transition

1 min read

I would like to announce that David Goeckeler is assuming leadership responsibilities for Cisco’s Security Business Group (SBG) effective immediately.  David has served as vice president of Product and Platform Engineering for the SBG for the last two years. His expertise will continue to help drive Cisco’s security momentum and ensure we are our customers’ […]

September 23, 2014

SECURITY

Continuing Our Legacy: Cisco Leads in Security Effectiveness

1 min read

Last week we announced the availability of Cisco ASA with FirePOWER Services, which represents the industry’s first threat-focused next-generation firewall (NGFW). This offering addresses threats across the full attack continuum anytime and anywhere a threat may manifest. Today NSS Labs released the final reports from its 2014 comparative NGFW testing, focusing on security effectiveness, total cost of […]

September 19, 2014

SECURITY

Evolving the Next-Generation Firewall: The Importance of Being Platform-Based

3 min read

Why is platform-based a key imperative for next-generation firewalls (NGFWs)? In our previous blog posts, we outlined what it means to be threat-centric, integrating best-in-class security layers with shared intelligence across all layers to combat advanced multi-vector threats. Multiple point products create considerable management complexity and cost for IT staff who are under tremendous pressure […]

September 18, 2014

SECURITY

Mobile Cloud Security: What CXOs Need to Know

4 min read

As organizations seek ways to maintain real-time connections with their workforce and customers in an increasingly digital and mobile-centered world, the growth of mobile cloud will be a major force in shaping the business landscape and future tech decisions. The first blog post in this series, by Padmasree Warrior, explores how the convergence of mobility […]

September 17, 2014

SECURITY

T-7 Days to Improved Cisco IOS Security

2 min read

The Cisco IOS Software Security Advisory Bundled Publication will go live in seven days and this time we will have an important update to the Cisco IOS Software Checker to go along with it. As a reminder, the Cisco Product Security Incident Response Team (PSIRT) releases bundles of Cisco IOS Software Security Advisories on the […]

September 16, 2014

SECURITY

Introducing the Industry’s First Threat-Focused Next-Generation Firewall

3 min read

Cisco is a strong proponent for shifting the mindset regarding the capabilities a Next-Generation Firewall (NGFW) must provide to stay relevant in a world that is dealing with dynamic threats. While nothing is technically wrong with legacy NGFWs, much is wrong with their approach. To meet current and future needs, a NGFW must now provide […]