What do “Going Green” and policy group sharing have in common? More than you think!
New Cisco Identity Services Engine (ISE) v2.1 Enables TrustSec-ACI Policy Plane Integration “Going green” is all about reducing waste and protecting the environment. It’s a movement most of us believe...
Kuwait Oil Company Gets More Secure
To protect themselves from attacks, Kuwait Oil Company turned to Cisco to help manage who accesses their network, where they access it, and on what devices with centralized policy management.
Cybersecurity for Defense: Network Segmentation
Classifying and compartmentalizing information has been around within the Department of Defense before it was even called the Department of Defense. However, as DOD information that was once secured in vaults and safes has become digital data, many new regulations have been introduced that mandate how this data should be processed and handled. These regulations […]
Gartner’s perspective on Cisco TrustSec
I am very pleased to be able to share some Gartner research on TrustSec. While we’re continuing to make progress through broader product support, validation from auditors and implementation by other vendors, we believe that this research and Gartner’s perspective will provide you with a useful and informative viewpoint. To read Gartner’s perspective on TrustSec […]
Addressing Cyber-Security Challenges of Today and Tomorrow
Did you know that Cisco detects over 1.5 million intrusion attempts on Cisco’s network every day? With more than 13 billion NetFlow records captured daily, over 22 Terabytes of traffic inspected, and 750 Gigabyte of system logs collected on a daily basis, it’s changing the landscape for how to secure intellectual property, confidential information, and mitigate malicious attacks. This brief video shares relevant security […]
New Nexus 1000V Virtual Switch Release 3.1 Now Available
There has been some seismic activity happening in Bay Area and the epicenter for all Virtual Networking shifts is right here at Cisco HQ in San Jose. (Our sympathies go to all those affected by the real earthquake further to the north.) At Cisco, it’s all about the applications and the shift to dynamic network […]
Putting a Damper on ‘Lateral Movement’ due to Cyber-Intrusion
Analysis of high-profile cyber breaches often reveals how intruders gain their initial footprint in the targeted organizations and bypass perimeter defenses to establish a backdoor for persistent activities. Such stealthy activities may continue until intruders complete their ultimate mission—claiming the “crown jewels” of the victim organization. “Lateral movement” is a term increasingly used to describe […]
Batman, TrustSec, and PCI
One of my passions is around PCI compliance. I know that sounds oxymoronic. How can someone actually be passionate about something as dry as compliance? Well, for the sake of argument, I prefer delusional rationalization. I think of myself as Batman! I don’t have his intelligence, money, car, or cape (well, I do have the […]
Secure Access for the Real World, Really?
Yes, really. I just got back from Cisco Live! Milan where Chris Young, Senior VP at Cisco, spoke to the Cisco security story, Intelligent Cybersecurity for the Real World. The Cisco security strategy addresses many security challenges across a range of attack vectors (network, endpoint, mobile devices, cloud, or virtual). It covers the entire attack […]