security

May 15, 2014

SECURITY

Threat Detection: A Big Data Approach to Security

3 min read

Cisco recently announced the availability of Managed Threat Defense (MTD), an innovative managed security solution that applies real-time, predictive analytics to detect attacks and protect against advanced malware across extended networks. MTD helps our customers address the ever-changing nature of threats that threaten their most important asset—data. MTD is delivered through a cost-effective business model that […]

May 14, 2014

SECURITY

Protect Yourself Against the Next Security Flaw in the Cloud—Understand Shadow IT

2 min read

Recently, a bug in Internet Explorer made it possible for hackers to take over a user’s computer causing government agencies to suggest using a different browser. The Heartbleed flaw opened the door for encrypted data to be intercepted. These latest challenges highlight one thing inherent to any application—whether on premise or in the cloud—it is […]

Internet Security Necessary for Global Technology Economy

3 min read

Today’s security challenges are real and significant.  We want governments to detect and disrupt terrorist networks before they inflict harm on our society, our citizens, and our systems of government.   We also want to live in countries that respect their citizens’ basic human rights.  The tension between security and freedom has become one the most pressing […]

May 13, 2014

SECURITY

Dimension Data Series #3: Closing the Gap Between the Secure Mobility Vision and Real-World Implementation

3 min read

Mobile security is a top concern for IT and business leaders. This blog series with Dimension Data explores how organizational leaders can work together to mitigate concern and implement clearly defined policies and mobility goals. This blog will address closing the gap between secure mobility vision and real-world implementation. The first blog in this series […]

May 6, 2014

SECURITY

Dimension Data Series #2 – Mobility Policy: The Mobile Endpoint is the New Perimeter

5 min read

Mobile security is a top concern for IT and business leaders. This blog series with Dimension Data explores how organizational leaders can work together to mitigate concern and implement clearly defined policies and mobility goals. Jason Harris co-authored this blog. Below we will address how the mobile endpoint is the new perimeter. The first blog […]

May 2, 2014

SECURITY

Sensitive Data Exfiltration and the Insider

2 min read

The Insider Lifecycle Traditional security is designed to keep outsiders from getting in. What happens when the enemy is an insider? A new paradigm must be explored, where the focus needs to shift inward and how data is going outbound. Identifying anomalies in data exfiltration is critical to how to spot the insider. The insider […]

April 30, 2014

SECURITY

Taking Encryption to the Next Level: Enrollment Over Secure Transport Strengthens Adoption of Elliptic Curve Cryptograph …

3 min read

Enrollment over Secure Transport (EST) is a new standard (RFC7030) designed to improve the lifecycle management of digital certificates, a key element for secure communications. Cisco Engineer Max Pritikin coauthored the EST standard. We’re very excited about the potential use cases of EST, which are, as we’ll discuss in a moment, pretty versatile. To understand […]

April 30, 2014

NETWORKING

IWAN Wed: The Case for Direct Internet Breakout at Branch and IWAN

3 min read

Cloud services and SaaS applications is enabling customers to accelerate their business processes and improve employee productivity while lowering their total IT spending. The Cisco IWAN solution is helping organizations adopt cloud applications with an improved user experience by enabling local internet breakout from the branch environment, thus helping eliminate the need to backhaul internet-bound traffic […]

April 28, 2014

SECURITY

Manage Your Security As Threats Evolve – Continuous Solutions Help Midsize Organizations Adapt to Changing Securit …

2 min read

At the recent RSA Conference, I heard an MIT professor quip, “is it safe to keep passwords written on a piece of paper in your wallet?” Kidding aside, most of the mid-market customers I interacted with at RSA—in retail, healthcare, and manufacturing—understood the point. They all had similar security requirements. It was common to hear […]