In the infosec world, it’s well established that time is a precious commodity. Time to detection and time to resolution are critical concepts that can mean the difference between a minor incident and making the news. In order to be effective, security teams need to be able to quickly access data, gather insights and take the necessary actions to keep their organizations safe. To that end, we’re committed to simplifying our user interfaces and making it easier to manage security effectively across an enterprise. Cisco Email Security and Cisco Threat Grid are two prime examples.
Wednesday, 7 February 2018
Sunday, 4 February 2018
Cisco Container Platform – Kubernetes for the Enterprise
Developed by Google to shepherd their in-house container clusters, Kubernetes has been vying for the attention and adoption of cloud architects. For the past several years, Docker Swarm, Mesos and Kubernetes have engaged in the duel to bring orchestration nirvana to containerized applications. While there are other participants in the fray and while Mesos has had a longer showing, Kubernetes seems to be capturing the pole position according to this research. This assertion is reinforced by the recent addition of support for Kubernetes to Apache Mesos, to Pivotal Container Service and to Cloud Foundry. The most recent admission of market realities is Docker’s seamless integration of Kubernetes into their Enterprise Edition offering. Whichever container orchestrator eventually arises as the de facto standard, it is clear that enterprises are looking for more and more infrastructure abstraction so they can laser focus on core business objectives.
Friday, 2 February 2018
Network Visibility for Mergers and Acquisitions
Mergers and acquisitions bring major challenges to nearly every aspect of a business, but integrating two different networks while maintaining enterprise security is perhaps one of the most demanding trials an organization can undergo.
Every organization has their own security policies, and applying new ones to hundreds or even thousands of new machines and users can be a logistical nightmare. On top of that, increasing the size of a network also increases its threat surface, potentially giving attackers new avenues to gain access and compromise sensitive data.
Every organization has their own security policies, and applying new ones to hundreds or even thousands of new machines and users can be a logistical nightmare. On top of that, increasing the size of a network also increases its threat surface, potentially giving attackers new avenues to gain access and compromise sensitive data.
Wednesday, 31 January 2018
Cisco and IBM: Partnering for Better Security
Considering the spate of cyber threats faced by customers, the need to more easily prioritize these threats, understand the scope and veracity of the attacks, and subsequently automate the responses, has never been more critical. While many security vendors exist to address some challenges, no single technology or vendor provides the complete security customers require. Therefore, providing this extended protection often requires a collaborative ecosystem of security vendors.
Monday, 29 January 2018
Cisco Operational Insights: A New Way of Seeing Operations
Businesses thrive when they create value for their shareholder and stakeholders by maximizing revenues and minimizing costs. Technology, especially wireless and IoT, can be invaluable tools to achieve these goals. But, when it comes to operating costs, these IT pillars, while incredibly valuable, only address part of the challenge.
Friday, 26 January 2018
Flexible Algorithm makes Segment Routing Traffic Engineering even more agile
As more and more Service Providers and Enterprises operate a single network infrastructure to support an ever-increasing number of services, the ability to custom fit transport to application needs is critically important.
In that respect, network operators have been exploring Traffic Engineering techniques for some years now but have obviously run into many scaling issues preventing them from having an end-to-end, fine-grained control over the myriad services they offer.
In that respect, network operators have been exploring Traffic Engineering techniques for some years now but have obviously run into many scaling issues preventing them from having an end-to-end, fine-grained control over the myriad services they offer.
Thursday, 25 January 2018
IoT Edge Compute Part 1 – Apps and Deployment on Cisco IoT Gateways
Why We Need Edge Compute
We have been hearing about the increasing need for compute at the edge of our network for IoT devices. In case you are not familiar with this concept, edge compute is ncecessary due to the amount of information that is and will be generated from IoT devices. The problem to be addressed is typically one of three things: