Friday 29 December 2017

Cisco UCS Automation Series, Part I – Getting Started with UCS PowerTool

You WANT to Automate! But Where to Start?


You want to automate but not sure where to start or what tools to use or even what processes can be automated and if the thing you want to automate is even automatable. Does it offer an API? If it does, is there an SDK? Are there samples of what can be done? What has been done? How much can be done? A lot of questions typically bog down the process, mire you in indecision and eventually you give up!

Wednesday 27 December 2017

Thank You Cisco ISR G2 2900 and 3900 Series Routers

Over the past 9 years, the Integrated Services Router (ISR) G2 router portfolio has helped tens of thousands of Enterprise and Service Provider customers build, secure, grow, and transform their businesses. It has been the most successful router product line in the history of branch networking.

Saturday 23 December 2017

Introducing executive dashboards in CTA

No security risk assessment is complete without the executive summary section. Something that can answer the high level questions security teams get asked including “how secure are we?”, “what threats are affecting our network today?” and “how healthy is our network?” We have recently revamped the Cognitive Threat Analytics dashboard to provide answers to these questions and more.

Monday 18 December 2017

Malware stealing gigabytes of your data as seen by Cognitive Threat Analytics

Overview


Recently, about 50 users across 20 companies were alarmed by the Cisco Cognitive Threat Analytics (CTA) about a malware that exfiltrates gigabytes of data from their computers. An example of such CTA detection:

Friday 15 December 2017

Cisco & MapR set a Software Defined Storage World Record

66 years in the making!

It sounds like a long time, but first we had to wait for a few milestones to precede us:

◈ 1951 – UNIVAC pioneers use of magnetic tape for storage
◈ 1993 – Severe Tire Damage is the first band to live stream
◈ 2007 – Netflix launches their streaming media business

Wednesday 13 December 2017

Analyzing Network Traffic with Encrypted Traffic Analytics

Today, knowing who is using your network is table stakes. What’s essential is knowing how the network is being accessed, what applications are being used, when they are used and most importantly, whether or not those applications are safe enough and compliant with your organization’s policies.

Independent testing company Miercom recently carried out a comprehensive set of tests to evaluate traffic analysis capabilities of Cisco’s Digital Network Architecture & Huawei’s Agile Solution along with a few other test areas.

Monday 11 December 2017

Cognitive Research: Learning Detectors of Malicious Network Traffic

Malware is constantly evolving and changing. One way to identify malware is by analyzing the communication that the malware performs on the network. Using machine learning, these traffic patterns can be utilized to identify malicious software. Machine learning faces two obstacles: obtaining a sufficient training set of malicious and normal traffic and retraining the system as malware evolves. This post will analyze an approach that overcomes these obstacles by developing a detector that utilizes domains (easily obtained from domain black lists, security reports, and sandboxing analysis) to train the system which can then be used to analyze more detailed proxy logs using statistical and machine learning techniques.

Friday 8 December 2017

The Race is On: Is Your Network 5G Ready?

The growing 5G momentum promises tremendous commercial opportunities for service providers, with estimates that the global 5G market will be worth US$12.3 trillion by 2035. To pursue these new untapped opportunities, service providers need to ramp up their network capabilities to support future 5G services.

As we move closer towards mainstream 5G adoption, mobile networks are increasingly expected to handle more data-intensive applications and deliver low-latency connectivity to more devices. How can service providers keep pace and get a leg up on the competition?

Wednesday 6 December 2017

Cognitive Threat Analytics: Turn Your Proxy Into Security Device

Some of us still intuitively believe that our extensively safeguarded corporate networks are safe from the risks we are exposed to when connecting directly to public Internet. Yet, evidence suggests that most companies now operate with significant persistent malware present in the network. At the same time, malware has also evolved, and we have witnessed a larger proportion of infections being brief with relatively low risk. But, even the seemingly low risk infections may open a pathway or potentially escalate into full-fledged attacks with serious business impact.­­­­­­­­­

Monday 4 December 2017

CMS Brute Force Attacks Are Still a Threat

Brute force attacks have existed long before the Internet. As a cryptanalytic attack, it started being used as an attempt to access encrypted data when there were no other options available. With the rise of the Internet, this type of attack was quickly adopted. In a nutshell, a brute force attack consists of systematically trying different credentials until the correct combination is found. It’s like trying to open a combination lock by going through all possible combinations: eventually, it will pop open.

Friday 1 December 2017

The Cisco ASR 9000 – Timeless Versatility for Future Growth

Cisco’s Aggregation Service Router 9000 (ASR 9k) has evolved into the cloud-scale, multi-service platform offering unprecedented flexibility, scale, programmability and security for Service Providers today.

When the ASR 9k was first announced in November 2008, it was a 6-slot and a 10-slot chassis—each of them capable of handling 3.2Tbps and 6.4Tbps of traffic, respectively.