2020 has been a doozy of a year, and it can be an especially challenging time to keep your organization running smoothly in an already complex and ever-evolving security environment. Security analysts juggle an overwhelming number of alerts siloed across multiple consoles in order to counter attacks, protect against breaches, and stay compliant – and many are doing this while working from home for most of this year. This balancing act reminds me of my own personal experiences that you might be able to relate to.
Saturday, 12 December 2020
Take SecureX wherever you go – introducing the new ribbon browser extension
Friday, 11 December 2020
Revolutionize how you manage application resources across any environment
The business, application and infrastructure landscape has been changing rapidly over the last few years and even faster this year. Gone are the days where a handful of monolithic applications were running in a single datacenter fully managed by a central team – simpler days. IT teams are now required to use a diverse set of environments, distributed technologies, architectures, platforms and tools to manage the critical IT resources required to keep their apps running no matter where they reside.
The job of managing all this complexity around how user experiences are delivered through applications is now beyond human scale and has big implications for IT teams and businesses including; application performance issues, time wasted in war rooms and fighting fires, underutilized infrastructure, public cloud overprovisioning, and cost overruns.
According to an Insight IT Modernization survey conducted by IDG, more and more organizations are dealing with similar challenges and realizing the need for simplifying and streamlining their IT operations to be successful. 67% of survey respondents believe that business transformation efforts cannot proceed effectively without IT modernization.
In order to confront this complexity and ensure success in this new world, organizations are focusing on IT modernization projects in terms of quality of service, cost efficiency, availability, customer experience and more time for innovation
IT modernization means optimizing operating models
Rethink Cloud Operations
Turning data into action
Optimize hybrid cloud deployments
Manage Kubernetes at scale
Integration with APM tools
A “Hands-off” Operational Model
Thursday, 10 December 2020
Protecting Workloads Across Any Cloud and Application…Anywhere!
Automating and implementing a secure, zero-trust model for micro-segmentation based on application behavior and telemetry is easy to do using Cisco Secure Workload (formerly known as Tetration). See how your business can seamlessly achieve workload protection by providing:
◉ Reduced attack surface – Automate micro-segmentation through customized recommendations based on your environment and applications.
◉ Remain compliant – Granular visibility and control over application components with automatic detection and enforcement of compliance.
◉ Gain visibility – Track the security posture of applications across your entire environment.
◉ Enable Zero Trust – Implement a zero-trust model via continuous behavioral monitoring and automated enforcement of micro segmentation policies to every workload
Tuesday, 8 December 2020
Cisco CCNP Security 350-701 Certification | Syllabus | Practice Test
Cisco SCOR Exam Description:
Cisco 350-701 Exam Overview:
- Exam Name:- Implementing and Operating Cisco Security Core Technologies
- Exam Number:- 350-701 SCOR
- Exam Price:- $400 USD
- Duration:- 120 minutes
- Number of Questions:- 90-110
- Passing Score:- Variable (750-850 / 1000 Approx.)
- Recommended Training:- Implementing and Operating Cisco Security Core Technologies (SCOR)
- Exam Registration:- PEARSON VUE
- Sample Questions:- Cisco 350-701 Sample Questions
- Practice Exam:- Cisco Certified Network Professional Security Practice Test
A Three-Pronged Approach to Small Business Office Safety
For every small business, it’s essential to keep people healthy and safe. Like the old saying goes, safety first. And now with COVID-19, monitoring workplace hazards is an even higher priority. No matter how small your business might be, as an employer, you need to keep your workers and customers safe without disrupting the flow of business.
Using a combination of smart cameras and sensors, and collaboration tools, you can monitor your workplace and support social distancing and density limit policies. And apps for smartphones and wearables can help with employee health monitoring and contact tracing.
Beyond the technology, you need to take a three-pronged approach to help make sure everyone stays safe during the pandemic and beyond. You need to develop policies to prevent hazards, ensure that your safety procedures are implemented, and respond when emergencies arise.
Fortunately, easy to use technology can help in each of these areas.
1. Develop safety policies and procedures to prevent hazards
Effective workplace hazard monitoring goes hand-in-hand with well-designed safety policies. The US Occupational Health and Safety Administration (OSHA) has issued some general guidelines on preparing workplaces for COVID-19. OSHA recommends that all employers create an infectious disease preparedness and response plan for addressing the coronavirus as well as other potential health hazards. Similar codes exist around the globe. A well-designed plan should consider how workers might be exposed to COVID-19 through other workers, customers, and contacts outside the workplace. It should also factor in workers’ individual risk factors, such as age or pre-existing health conditions.
General preventive measures that OSHA advises employers to implement include:
◉ Exploring policies that can promote social distancing, such as telecommuting or flexible work hours
◉ Providing personal protective equipment, such as masks or goggles, as well as training for using such equipment
◉ Promoting hand washing
◉ Providing hand sanitizer containing at least 60% alcohol when hand-washing facilities aren’t available
◉ Encouraging workers to follow respiratory etiquette practices such as covering coughs and sneezes
◉ Advising sick workers to stay home
◉ Disinfecting surfaces and equipment regularly
◉ Discouraging workers from using other workers’ desks, phones, and equipment when possible
In addition to preventive policies, OSHA advises employers to develop policies and procedures for prompt identification and isolation of potentially infected workers. Such procedures can range from providing a separate room for workers exhibiting COVID-19 symptoms to instructing sick workers to stay home.
Technology can play a major role in helping employers implement these guidelines. For example, by using smart cameras in conjunction with analytics, you can gain a better understanding of how people move around your space so you can redesign workflows. Collaboration tools help simplify remote work and make it easier to manage staggered shifts where some people are in the office and some are not. Remote collaboration tools should include robust security features and be connected using network switches and routers that are user-friendly, flexible, and secure.
2. Monitor your workplace with smart cameras
Smart video cameras can be a valuable tool for monitoring the workplace to promote safety measures against COVID-19. Today’s cameras can be used for far more than simply physical security. They form part of a wireless ecosystem that small businesses can use for a wide range of applications. For example, Cisco Meraki MV smart cameras are used in retail environments for counting customers and analyzing floor traffic patterns to help optimize in-store marketing. That same technology can be deployed to collect information that supports workplace safety policies.
For example, let’s say your facility has a social distancing policy that requires workers to stay at least six feet apart. Just because people know the policy exists doesn’t necessarily mean it will be followed. Surveillance cameras can provide transparency and accountability and help you identify the areas of your facility that are most prone to social distancing issues. Armed with this information, you can take steps to remedy problems in those parts of your premises.
Ideally, a strategic plan for monitoring your small business with surveillance cameras should follow a three-step procedure:
◉ Install a smart camera surveillance system that can show you where people are, where they go, and what they’re doing.
◉ Connect your smart surveillance system to a cloud network that lets you review and analyze footage through a central dashboard
◉ Assess the footage and access the video analytics for object detection and motion heatmaps to support safer workplace policies and procedures
Cutting-edge smart cameras such as Cisco Meraki MV can pick up more information that just images. The built-in intelligence includes motion heatmaps that display relative movement over time so you can see traffic patterns and object detection that shows you where people are, so you can see where they’re congregating and where they linger.
For purposes of preventing COVID-19, you can track where workers and customers are congregating on your premises and whether there are any motion patterns that conflict with your social distancing policies. You can then review these movement patterns and determine whether measures such as installing barriers or rerouting traffic might help promote safer social distancing.Workplace monitoring also can help you monitor worker behavior. For example, you can make sure hand washing and sanitizing procedures are being followed. Healthcare providers have long been aware that simply having hand hygiene policies does not guarantee their enforcement. On average, healthcare providers wash their hands less than half as often as they should, according to the Centers for Disease Control and Prevention.
A study by the Santa Clara Valley Medical Center found that healthcare workers are twice as likely to comply with hand washing policies when they know they are being monitored. Now some hospitals are installing digital sensors and apps to monitor how frequently workers wash their hands. The MV campers let you view video quickly with motion recap, which summarizes activity into a single image, so you don’t have to scroll through a lot of irrelevant video to get answers.
Smart surveillance cameras can also help promote policies requiring workers to wear masks. When workers know they’re being monitored, they’re more likely to comply with mask mandates. Cameras can help reduce the need for unpleasant confrontations and heavy-handed measures. Surveillance cameras can be particularly useful for monitoring parts of your facility where workers are most likely to neglect social distancing and mask-wearing policies, such as break rooms.
3. Identify and resolve issues
In addition to preventive measures, a viable COVID-19 workplace safety policy must include procedures for identifying and addressing situations where workers are displaying coronavirus symptoms or are already infected. This is another area where using the right technology tools can help you implement safety policies.
Some employers have adopted temperature checks and other diagnostic screening procedures as a way to identify workers with coronavirus symptoms. One way to protect screeners is by using telehealth technology to support social distancing during screening. By pairing smartphones with smart thermometers, you can take your temperature with your iPhone or Android device. Using this type of technology can allow workers to provide temperature readings to employers from a socially safe distance.
Stay safe and wash your hands
The Cisco Designed portfolio includes technology that is curated specifically for small businesses. We can help you set up tools for safe distancing and real-time monitoring.
Saturday, 5 December 2020
Regaining Control of the Digital Experience
2020 will likely be remembered as the year that pushed enterprises over the digitization tipping point. In just a few months, enterprises have had to transform how their employees work, how they serve their customers, and in some cases, they have had to also pivot to a new business model. Knowledge workers are now working from anywhere, contact center agents are taking customer calls from their home, patients are electing to visit their physician virtually, and consumers have moved to digital channels.
Some of these changes are temporary, but many are likely here to stay.
This shift has led to a disaggregated digital footprint and hyper-distributed IT environments. As enterprises accelerate their adoption of cloud hosted applications across hybrid and multicloud architectures, applications and services have also become more distributed.
While the perimeter of the IT environment has drastically expanded, IT does not always have full control over the application and infrastructure stack, and connectivity is reliant on unpredictable third-party networks, IT is still responsible for delivering a seamless end user experience.
So how can IT continue to optimize digital experience?
It starts with visibility – with an end-to-end view of the delivery of applications and services over the Internet.
Friday, 4 December 2020
All Tunnels Lead to GENEVE
As a global citizen, I’m sure you came here to read about Genève (French) or Geneva (English), the city situated in the western part of Switzerland. It’s a city or region famous for many reasons including the presence of a Cisco R&D Center in the heart of the Swiss Federal Institute of Technology in Lausanne (EPFL). While this is an exciting success story, the GENEVE I want to tell you about is a different one.
GENEVE stands for “Generic Network Virtualization Encapsulation” and is an Internet Engineering Task Force (IETF) standards track RFC. GENEVE is a Network Virtualization technology, also known as an Overlay Tunnel protocol. Before diving into the details of GENEVE, and why you should care, let’s recap the history of Network Virtualization protocols with a short primer.
Network Virtualization Primer
Over the course of years, many different tunnel protocols came into existence. One of the earlier ones was Generic Routing Encapsulation (GRE), which became a handy method of abstracting routed networks from the physical topology. While GRE is still a great tool, it lacks two main characteristics that hinder its versatility:
1. The ability to signal the difference of the tunneled traffic, or original traffic, to the outside—the Overlay Entropy—and allow the transport network to hash it across all available links.
2. The ability to provide a Layer-2 Gateway, since GRE was only able to encapsulate IP traffic. Options to encapsulate other protocols, like MPLS, were added later, but the ability to bridge never became an attribute of GRE itself.
With the limited extensibility of GRE, the network industry became more creative as new use-cases were developed. One approach was to use Ethernet over MPLS over GRE (EoMPLSoGRE) to achieve the Layer-2 Gateway use case. Cisco called it Overlay Tunnel Virtualization (OTV). Other vendors referred to it as Next-Generation GRE or NVGRE. While OTV was successful, NVGRE had limited adoption, mainly because it came late to Network Virtualization and at the same time as the next generation protocol, Virtual Extensible LAN (VXLAN), was already making inroads.