Saturday, 19 December 2020

Industrial IoT: Top 3 trends for 2021

Cisco Prep, Cisco Certification, Cisco Exam Prep, Cisco Guides, Cisco Learning

After 2020’s twists and turns, here’s hoping that 2021 ushers in a restored sense of “normal.” In thinking about what the upcoming year might bring for industrial IoT, three key trends emerge.

Trend #1: Securing operational technology (OT)

IT will take a bolder posture to secure OT environments.

Cyber risks in industrial environments will continue to grow causing IT to take bolder steps to secure the OT network in 2021. The CISO and IT teams have accountability for cybersecurity across the enterprise. But often they do not have visibility into the OT network. Many OT networks use traditional measures like air gapping or an industrial demilitarized zone to protect against attacks. But these solutions are rife with backdoors. For example, third-party technicians and other vendors often have remote access to update systems, machines and devices. With increasing pressure from board members and government regulators to manage IoT/OT security risks, and to protect the business itself, the CISO and IT will need to do more.

Success requires OT’s help. IT cybersecurity practices that work in the enterprise are not always appropriate for industrial environments. What’s more, IT doesn’t have the expertise or insight into operational and process control technology. A simple patch could bring down production (and revenues).

Bottom line? Organizations will need solutions that strengthen cybersecurity while meeting IT and OT needs. For IT, that means visibility and control across their own environment to the OT network. For OT, it means security solutions that allow them respond to anomalies while keeping production humming.

Trend #2: Remote and autonomous operations

The need for operational resiliency will accelerate the deployment of remote and autonomous operations – driving a new class of networking.

The impact of changes brought on in 2020 is driving organizations to increasingly use IoT technologies for operational resiliency. After all, IoT helps keep a business up and running when people cannot be on the ground. It also helps improve safety and efficiencies by preventing unnecessary site visits and reducing employee movement throughout facilities.

In 2021, we will see more deployments aimed at sophisticated remote operations. These will go well beyond remote monitoring. They will include autonomous operational controls for select parts of a process and will be remotely enabled for other parts. Also, deployments will increasingly move toward full autonomy, eliminating the need for humans to be present locally or remotely. And more and more, AI will used for dynamic optimization and self-healing, in use cases such as:

◉ autonomous guided vehicles for picking and packing, material handling, and autonomous container applications across manufacturing, warehouses and ports

◉ increased automation of the distribution grid

◉ autonomous haul trucks for mining applications

◉ Computer-based train control for rail and mass transit

All these use cases require data instantly and in mass, demanding a network that can support that data plus deliver the speed required for analysis. This new class of industrial networking must provide the ability to handle more network bandwidth, offer zero latency data and support edge compute. It also needs security and scale to adapt quickly, ensuring the business is up and running – no matter what.

Trend #3: Managing multiple access technologies

Organizations will operate multiple-access technologies to achieve operational agility and flexibility.

Cisco Prep, Cisco Certification, Cisco Exam Prep, Cisco Guides, Cisco Learning
While Ethernet has always been the foundation for connectivity in industrial IoT spaces, that connectivity is quickly expanding to wireless. Wireless helps reduce the pain of physical cabling and provides the flexibility and agility to upgrade, deploy and reconfigure the network with less operational downtime. Newer wireless technologies like Wi-Fi 6 and 5G also power use cases not possible in the past (or possible only with wired connectivity).

As organizations expand their IoT deployments, the need to manage multiple access technologies will grow. Successful deployments will require the right connectivity for the use case, otherwise, costs, complexity and security risks increase. With wireless choices including Wi-Fi, LoRaWAN, Wi-SUN, public or private cellular, Bluetooth and more, organizations will need to determine the best technology for each use case.

Cisco’s recommendation: Build an access strategy to optimize costs and resources while ensuring security. Interactions between access technologies should deliver a secured and automated end-to-end IP infrastructure – and must avoid a “mishmash” leading to complexity and failed objectives.

Friday, 18 December 2020

The Why of AI and ML

Cisco Exam Prep, Cisco Tutorial and Material, Cisco Certification, Cisco Learning, Cisco Guides, Cisco Career

In recent years, Artificial Intelligence (AI) and Machine Learning (ML) have been in the spotlight. I think by now folks understand that neither are some strange form of technological magic, but rather a science and some working knowledge of the domain is now well understood. However, up to this point, the question has been “what are AI and ML?”  But what I want to take some time to ask, is why? Why do we need them? Why will they still be a part of products and services; not just in security but throughout our digital lives?

The short answer is because we can no longer operate at human-scale to be competitive. It is necessary that we operate to some degree at machine-scale and this is where advanced computer science techniques become valuable. AI and ML are just a few of these techniques and to maximize their benefits, we must know how to use them safely and effectively. Like any advanced technology, they can be used for good or for bad or maybe I should say that it could be used for your benefit or your demise.

There is a pattern that joins humans to machines, machines to machines, machines back to humans, and humans to humans. We have hundreds of years of social science that we can use when examining human to human patterns. Machine to machine includes a multitude of well-known patterns in computer science discussed on a daily basis. So for now, let’s concentrate on the patterns that integrate humans with machines and vice versa.

Human-to-machine communication is largely based on the human’s ability to communicate their “intent” to the machine. This is done via a model that the machine can process and that the human can express and understand. The precision of this model is critical to the overall success. A model that is too coarse limits the machine’s accuracy in its automation; while a model that is too precise may lead to humans making errors in their expression or just be too tedious to maintain. A great example of a model done well is cloud-native orchestration like Kubernetes. The admin can specify his/her intent for production in a model and Kubernetes orchestrates these microservices in an adaptive manner depending on future demand of the environment – scaling up and down depending on criteria.

One last thing to add about these models that sit in-between human-to-machine is that in the example above, the initial model may have been instantiated by the human, but over time, machines via their observations, can create their own models at scales well beyond human perception. You could say that these machine derived models are “machine-learned.”

The machine-to-human pattern is largely constrained by human cognition and human understanding. No matter how fancy your machine learning system may be, if the human cannot understand how the machine arrived at an answer, it cannot be trusted. Machines must “explain” their findings and analytical outcomes in a way that humans can understand. Failing to do so means that automation is not being safely managed and should not be coupled with actions that are critical to human life or to the business. To operate at machine-scale effectively and safely, machines must be able to communicate their operational integrity and analytical outcomes in ways that their human steward can comprehend. This is challenging because in some cases, machines are interfacing with experts and in some cases, non-experts. In the end, you must design systems that are observer-centric and accommodate for the different personas that use the system.

Cisco Exam Prep, Cisco Tutorial and Material, Cisco Certification, Cisco Learning, Cisco Guides, Cisco Career

Getting this right means that we can leverage machines as tools that help us go beyond human perception and even what is humanly possible to build as a workforce. This would not have been such a useful capability if it were not for the Internet. Because of the Internet, businesses are asked to understand questions that are global in scale, that deal with petabytes of data, quantities of data processing that are just no longer at human-scale. Businesses are also having to operate with dynamic ranges never experienced in our recorded history: On Monday you may have to service 30,000 customers, on Tuesday THE ENTIRE INTERNET SHOWS UP, and on Wednesday 20,000 customers. Without the help of machines, we could not take advantage of these opportunities.

The term Machine Learning has been used synonymously with Artificial Intelligence when in reality, ML is a child of AI. So, if AI is the parent of ML, does ML have any brothers and sisters? The answer is yes and over the years, we will move beyond the data science-biased ML as we meet and get to know these new siblings that will help us humans operate safely and securely at machine-scale.

Thursday, 17 December 2020

Forget the New Normal. Experience a New Difference With The All New Webex

Cisco Exam Prep, Cisco Tutorial and Material, Cisco Certification, Cisco Career

Staying Connected and Getting Work Done with the All New Webex

The rapid uptake of remote working has led to a parallel increase in use of Webex as businesses key collaboration tool for colleagues to stay connected and get work done.

The power of the all new Webex is the ability to bring together everything you need to see a project through to fruition – One easy-to-use and secure app to call, message, meet and make exceptional work happen. As a result, you may find yourself operating within one app for most of your working day.

With this in mind our Cisco Collaboration team have been brainstorming ideas that not only help you complete your work, but also represents your style and personality.

In this new release we are excited to introduce:

1. Fresh new color themes

2. Backgrounds for your profile, contact card and spaces

3. Cobranding options to reinforce your corporate brand


Fresh New Color Schemes


First up, we have added 3 new color themes to reinvent your Webex experience. You now have a choice between Jade, Lavender and Bronze – each available in light and dark mode on your desktop and mobile app. Easily transform your app color theme within the ‘Appearance’ tab in the app settings.

Cisco Exam Prep, Cisco Tutorial and Material, Cisco Certification, Cisco Career

Expressive New Backgrounds


Next up, you can now add fun and a splash of personality to your Webex app with new backgrounds for your profile, contact card and spaces. Backgrounds can also act as great way to help you differentiate between each of your workflow spaces.

Backgrounds are easily accessible in your app settings. You can now pick from a select number of designs to change a standard space into a fun and visually appealing work area. But stay tuned, as custom backgrounds are coming soon!

Cisco Exam Prep, Cisco Tutorial and Material, Cisco Certification, Cisco Career

The Power of Webex with Your Own Brand


Finally, we have introduced the ability to co-brand Webex with your own company brand. Your brand is your company’s identity, it has value, gives you direction and customer awareness.  And, now you can include that within your Webex experience by adding your company colors to the app header and your company logo on the side panel bar.

Cisco Exam Prep, Cisco Tutorial and Material, Cisco Certification, Cisco Career

Color themes, backgrounds and co-branding are just the start in the Webex journey to bring yourself to your virtual workplace.

Wednesday, 16 December 2020

What’s in a name? ”Catalyst” 8000 “Edge” Platforms

Cisco Prep, Cisco Tutorial and Material, Cisco Certification, Cisco Learning, Cisco Guides, Cisco Career

On October 20, Cisco announced the new Catalyst 8000 Edge Platforms Family, to help customers deliver secure connectivity to hybrid and multicloud applications across cloud, data center and edge locations. The new Portfolio transforms the WAN edge so customers have secure access, agility and the best experiences when connecting to applications anywhere. These new platforms support customers’ move to a SASE architecture by converging cloud-managed SD-WAN and cloud-delivered security (Cisco Umbrella) into one solution.  Customers will also have access to the full SD-WAN security stack for on-prem deployments.

As part of launching the new Catalyst 8000 family, I’ve had the opportunity to talk to a number of industry analysts, media, channel partners and customers.  I would like to address a few questions that have come up in my briefings.

Why extend “Catalyst” brand to the WAN?

With the new Catalyst edge platforms, we are meeting the requirements of the WAN edge, and providing another foundational piece of our intent-based network strategy that spans every domain of the network.

Cisco launched its Intent Based Networking (IBN) initiative targeted for enterprises a few years ago. This initiative was meant to address the complexity that spans campus, wireless and WAN, by transforming the usually static network fabric into a controller-led architecture that captures business intent and translates it into policies that can be automated and applied consistently across the network. The programmability of the fabric combined with integrated analytics allows it to be agile and elastic to help deliver desired business outcomes.

The Catalyst 8000 family was given the “Catalyst” name because as we continue to grow and build upon our intent-based networking (IBN) portfolio it is important that there is product, branding and messaging alignment across Access (LAN) and WAN and that customers view the IBN portfolio as a set of products that unify their enterprise networks and provide software-defined capabilities via a common IOS-XE operating system. With the new naming, the Catalyst brand is now part of the Intent Based Portfolio along with Catalyst Switches and Catalyst APs.

Cisco Prep, Cisco Tutorial and Material, Cisco Certification, Cisco Learning, Cisco Guides, Cisco Career

Why is the new portfolio called an Edge device and not a Router?


Enterprise WANs have transformed over the last decade. As Enterprises across various industry segments are looking at digitalization for gaining business advantage, Cloud, IOT, 5G and Edge Compute are quickly becoming key pillars of their digitalization strategies.

The WAN edge hence has become critical to digital businesses, particularly the edge of the WAN where the traditional black-box router no longer serves the needs of the modern enterprise. Speeds and feeds remain important, but today’s networks require a WAN edge platform that is agile, flexible, and open to host multi-service edge functionality.

We are calling these devices “edge platforms” versus “routers” because the definition of a router has evolved over the past few years to be more of a WAN edge device; providing connectivity from distributed locations to both data centers and the cloud, service flexibility for on-prem or cloud deployments as well as containerized hosting of local network services and business applications.

How is a new hardware portfolio a relevant, differentiator, when the WAN world is going software-defined?


With its IBN initiative, Cisco has significantly inverted its development model to be a software led model first with user experience as a key focus area.

The Catalyst 8000 family includes the Catalyst 8000V Edge Software, a virtual platform for anyone that wants to deploy Cisco routing as a virtual network function (VNF) on a general-purpose hardware or in cloud deployments. For environments outside of cloud, our customers, however, prefer a customized solution from Cisco to deliver software innovations for better performance, scale, security, reliability, and flexibility.

High-end aggregation deployments need performance and scale which cannot be fulfilled with a general-purpose CPU architecture. Cisco’s investment in the custom ASIC (QuantumFlow Processor 3.0) allows us to deliver industry leading performance, SD-WAN tunnel scale, and 40/100G interfaces in a compact, one rack unit form factor for the Catalyst 8500 Series Edge Platforms.

In keeping with the industry trend, Cisco’s access portfolio leverages an x86 architecture that gives us flexibility to run containerized services, while also providing the choice of connectivity and flexibility much needed in a global deployment. The new Catalyst 8300 Series Edge Platforms provide 70+ different interface choices including network interface cards, cellular interface cards, voice modules (industry’s only SD-WAN solution that offers support for IP telephony), switch modules, service modules as well as an edge compute module to host local apps and service VNFs. This flexibility is much needed in customer environments to address a variety of deployment needs.

The hard reality of today’s deployments are that most SD-WAN vendors focus on the software functions of building WAN overlays but have been missing out on addressing the underlay needs – variety of interfaces, transport choices with associated protocols, performance, scale, flexibility to add services. Thus, these solutions often end up becoming an add on to an existing Cisco router for the underlay. This adds cost to the overall solution which is often missed in the analysis.

In closing, with the Catalyst 8000 Edge Platforms Family, we are helping you adapt to the requirements of the new WAN edge and providing another foundational piece of our intent-based network strategy that spans every domain of the network — campus, branch, WAN and DC/cloud.  ​The Catalyst 8000 family is the best-in-class platform for SASE, SD-WAN, and 5G in the future; built to address today’s most pressing WAN edge issues, and flexible enough to tackle the challenges of tomorrow.

Tuesday, 15 December 2020

300-715 Exam Practice Questions | Cisco CCNP Security Exam Info

 

Cisco SISE Exam Description:

The Implementing and Configuring Cisco Identity Services Engine v1.0 (SISE 300-715) exam is a 90-minute exam associated with the CCNP Security, and Cisco Certified Specialist - Security Identity Management Implementation certifications. This exam tests a candidate's knowledge of Cisco Identify Services Engine, including architecture and deployment, policy enforcement, Web Auth and guest services, profiler, BYOD, endpoint compliance, and network access device administration. The course, Implementing and Configuring Cisco Identity Services Engine, helps candidates to prepare for this exam.

Cisco 300-715 Exam Overview:

Related Article:-

EDR. NDR? XDR! … is it more than just marketing?

Cisco Prep, Cisco Tutorial and Material, Cisco Exam Prep, Cisco Certification, Cisco Learning, Cisco Career

As is often true with new security concepts, vendors are quickly adopting the new terminology to showcase their products’ capabilities. This is where things get confusing and tricky. Some vendors are using XDR (Extended Detection & Response) as a marketing strategy for their existing EDR (Endpoint Detection & Response) or NDR (Network Detection & Response) products, others are launching new products or just rebranding existing products explicitly as “XDR”. Some vendors have built both EDR and NDR, others sell one and partner for the other — yet both approaches claim to be XDR. With the same term being used in multiple ways it can be hard for buyers to understand what XDR actually requires and the security outcomes that should be achieved by it.

So, we want to cut through the noise and provide some clarity on XDR:

◉ Understand the needs driving XDR adoption

◉ Explore Gartner’s definition of the category

◉ Learn how Cisco delivers XDR use cases with our solutions

◉ Discover ways to start your XDR journey

Get the details in our eBook

10 ways Cisco delivers XDR capabilities today

Here’s a sneak peek into 3 of the 10 use cases. Click on the images to see in greater detail.

Use Case #2: Reduced detection times

Detect even subtle or hidden attacks via insider, unknown, or encrypted threats:

Cisco Prep, Cisco Tutorial and Material, Cisco Exam Prep, Cisco Certification, Cisco Learning, Cisco Career

Use Case #3: Enriched alerts


Enriched alerts with cross-product context that streamline operations due to the simplicity, visibility, and lowest false positive rates:

Cisco Prep, Cisco Tutorial and Material, Cisco Exam Prep, Cisco Certification, Cisco Learning, Cisco Career

Use Case #4: Root Cause Analysis


Visualized root cause analysis from execution to access, lateral movement to exfiltration, and more:

Cisco Prep, Cisco Tutorial and Material, Cisco Exam Prep, Cisco Certification, Cisco Learning, Cisco Career

Monday, 14 December 2020

Cisco SD-WAN Integration with AWS Transit Gateway Connect Raises the Bar for Cloud Performance and Scale

As the SD-WAN enterprise customers increase their consumption of business-critical applications from cloud or directly as SaaS over the Internet, there is a growing need for on-demand SD-WAN extension to the cloud or SaaS of choice.

Cisco has partnered with AWS, to deliver Cisco SD-WAN Cloud OnRamp to extend our SD-WAN fabric to AWS workloads.

As our customers transition their workloads to AWS, Cisco continues to build on this partnership to accelerate our customer’s SD-WAN journey to AWS.

In our current integrated solution between Cisco SD-WAN and AWS Transit Gateway, Cisco SD-WAN Cloud OnRamp enables users to connect to their AWS workloads using the Cisco SD-WAN controller(vManage). The Cloud OnRamp feature automates Cisco SD-WAN fabric extension from branch routers to Amazon VPCs. In addition, the integration with TGW Network Manager enables seamless network visibility either through vManage or AWS console. This provides a comprehensive view of the on-premises network, including the WAN, and the customer’s AWS network. All underlying tasks such as spinning up Cisco SD-WAN cloud routers, such as Catalyst 8000V Edge Software, creating Transit VPC, and establishing IPsec VPN tunnels to AWS TGW and forming BGP adjacency are completely automated. In addition, customers can extend network segmentation policies from on-premises to AWS Cloud via a simple-to-use GUI in Cloud OnRamp.

Cisco Exam Prep, Cisco Tutorial and Material, Cisco Learning, Cisco Guides, Cisco Certification, Cisco Study Material

The existing solution with Cloud OnRamp automates the entire orchestration of the TGW and VPC networking, hence reducing the time-consuming manual task to a matter of minutes.

We have integrated further with AWS on our current solution, for customers requiring throughputs in excess of the 1.25 Gbps that is possible today with an IPsec tunnel connection, and preferring not to manage establishing multiple tunnels to scale bandwidth beyond 1.25Gbps. While some other customers have security/compliance considerations and need to establish private IP addresses along the entire path from branch to AWS.

Cisco Exam Prep, Cisco Tutorial and Material, Cisco Learning, Cisco Guides, Cisco Certification, Cisco Study Material

In response to our customer requirements, we are excited to announce our latest integration of Cisco SD-WAN Cloud OnRamp with AWS Transit Gateway Connect.

This latest offering with AWS Transit Gateway Connect, builds upon our existing AWS relationship to provide a tightly integrated solution with additional key benefits, like:

1. Reduced costs with higher bandwidth connections: The new integration between Cisco and AWS uses native GRE tunnels instead of IPsec tunnels, offering up to 4 times the bandwidth and eliminating the challenges and costs of establishing and maintaining a multitude of IPsec tunnels.

2. Enhanced security: By removing the need for public IP addresses, customers with strict security requirements can deploy the solution using private IP addresses to significantly reduce the attack surface reducing risk and streamlining compliance.

3. Increased route limit: This new architecture will increase the number of BGP network advertised routes many-fold over the existing 100 route limit. **

4. Increased visibility: Integration with Transit Gateway Network Manager will provide an increased level of visibility such as performance metrics and telemetry data not only from the third-party appliances but also from the branch appliances sitting behind them. This allows customers to monitor end-to-end network across AWS and on-premises.