Tuesday, 22 August 2017

How Your Network Just Became the Smartest Student in the Class

The Network. Intuitive. is a complete transformation in hardware, software, and management that will change how networks operate, enabling them to adapt in real time with artificial intelligence (AI), and delivering the secure foundation for our digital world, faster and more  securely, all while driving down operational cost. This new era in programmable networking leverages machine learning and analytics to deliver a new level of intelligence at the core of any organization. So, what does that mean for the future of Digital Education?

Sunday, 20 August 2017

Service Provider Security Architecture – Part 2

In my earlier blog post, I described the need for pervasive security and architectural approaches to enable secure, agile services against increasingly sophisticated attackers. Pervasive security is critical to the Open Network Architecture (ONA).

Saturday, 19 August 2017

Service Provider Security Architecture – Part 1

There has never been a more interesting time to be a Service Provider.  Today, we are in the midst of a once in a generation transition in technology that we last saw with the birth of the internet.  Today, the exponential growth in hyper-connectivity, the services that evolve upon it and the dawn of the Internet of Things demand a next generation of flexible and dynamic infrastructure.  To power this new epoch in infrastructure, Service Providers are grappling with the promise and challenge of such technologies as virtualization and orchestration.   Compounding this challenge is the need to maintain the security of this critical infrastructure and the confidentiality, integrity and availability of the information that resides upon it.  Service Providers are well aware of this requirement and have traditionally built architectures that focused on enforcement of the security perimeter.

Friday, 18 August 2017

Digital Transformation Taking Flight in ASEAN Region

We showcased our innovation at CommunicAsia in Singapore a week ago, highlighting the changing digital landscape and sharing insights on how companies should be ready for the future.

Our senior executives were on hand to address topics and trends impacting organizations across the region, from strategies to migrate to 5G, the importance of IoT/M2M in this transition and learning how to orchestrate network services in the age of the cloud.

Friday, 11 August 2017

Cisco’s 3-Phase Plan for your 5G success

It is generally accepted that revenues for mobile service providers are trending flat to down. A recent ARPU report from Informa provides this picture in detail by country. Some mobile service providers have acquired content services as a way to boost this trend, but they admit that this too will eventually trend to flat again. What is needed is a new business model that goes beyond connectivity and bandwidth. There are a number of studies on digital transformation and 5G in particular that note the services for enterprise are strong growth opportunities between now the 2025 (and beyond). There is an in-depth 2016 report from the European Commission with a catchy title of “Identification and quantification of key socio-economic data to support strategic planning for the introduction of 5G in Europe” that projects a large growth in enterprise business for mobile service providers 5G network services between now and the 2025.

Thursday, 10 August 2017

Deep Dive into AMP and Threat Grid integration with Cisco Email Security

In this blog post, we are going to dive deeper and explain the workflows of AMP and Threat Grid integration with Cisco Email Security (applies to both Cloud Email Security and on premise Email Security Appliance), as well as help administrators refine security posture in their organizations. Let’s start with a quick recap of how file reputation, file analysis and file retrospection work together in general.

Wednesday, 9 August 2017

Replace your AV with Next Generation Endpoint Security

If you’ve been to a security conference in the last year you’ve probably seen more than 20 different vendors all talking about endpoint security. Some might be talking about next generation anti-virus, endpoint detection and response, and even the much lauded machine learning. How do you cut through the clutter and noise to find what you are looking for?