Articles
Data Security Through the Cloud [summary]
Is the combination of cloud computing and mobility a perfect storm of security threats? Actually, yes. And you should prepare for them as if there is a storm coming. As businesses become increasingly mobile, so does sensitive data. In fact, in a recent survey conducted by ESG, 31% of security profes…
Data Security Through the Cloud
Is the combination of cloud computing and mobility a perfect storm of security threats? Actually, yes. And you should prepare for them as if there is a storm coming. As businesses become increasingly mobile, so does sensitive data. In fact, in a recent survey conducted by ESG, 31% of security profes…
What will Security for the Network of the Future Look Like?
In the next few years, there will be more mobile users and more mobile connections than ever: By 2018, there will be 4.9 billion mobile users, up from 4.1 billion in 2013, according to the newly released Cisco VNI forecast In addition, there will be 10 billion mobile-ready devices and connections,…
CHAOS (Control Havoc and Overhaul Security): The new Order for IT
Mobility and the cloud have changed how we work, transforming pockets of downtime into bursts of productivity, with easy access to our most valued information and people. But this transformation has unleashed havoc. Security practices built on decades-old assumptions of placing controls at key point…
Mobile Security: Is the Risk Worth the Reward?
This blog is part two of a three-part blog series discussing how organizations can address mobile security concerns through an architectural approach to mobility. In my first post of this three-part series, I discussed how next-gen Wi-Fi models will pave the way for secure mobility and the value o…
What Next-Generation Wi-Fi Models Could Mean for Secure Mobility
With the adoption of the Internet of Things and Internet of Everything, advances in mobility and next-generation Wi-Fi are driving faster speeds, higher signal quality and more reliable connectivity. With the upcoming ratification of the two waves of the 802.11ac Wi-Fi standard, how are emerging Wi-…
August 2013 #SecureDC Twitter Chat Recap: SDN Security
Our first SecureDC twitter chat created some great industry dialog around security for Software Defined Networks (SDN) as well as using SDN to improve security. SDN is going through a similar hype cycle as seen with cloud and we feel that it’s important to focus more on education now and broader col…
Join @SecDatacenter and Top Industry Experts for #SecureDC Chat on SDN Security, 8/27 at 11am PT
Many network administrators over the years have viewed information security technologies as somewhat of a necessary evil, as opposed to a necessity. Security costs like the purchase and maintenance of firewalls, web filtering, anti-malware scanning, and encryption are seen as an additional burden as…
5 Areas of ROI on Data Center Security
As data center operations managers and business owners analyze their budgets to uncover economic headwinds, the importance of deriving ROI from each purchase and initiative is considered. To better understand the costs and benefits of the Cisco Secure Data Center Solution, we engaged with analyst fi…
2