Avatar

Kathy Trahan

Senior Security Solutions Marketing Manager

Global Marketing Corporate Communications

Kathy Trahan is a Senior Security Solutions Marketing Manager in the Product Solutions Marketing group for Security at Cisco. Kathy provides outbound marketing for the Secure Unified Access solutions. With more than 15 years of experience in high tech and IT Security, Kathy has held prior roles at Check Point, NetApp, Nokia, Sun Microsystems, Symantec and TrendMicro. She lives in San Jose, CA with her husband and two children.

 

Articles

May 5, 2014

SECURITY

The Continuum Approach for Secure Mobility

A couple weeks ago, we spoke about the mobility journey and the phases that organizations take as they embrace the widely accepted mode of mobility—Beyond BYOD to Workspace Mobility (device-focus, application-focus and experience-focus). Whatever phase your organization is in, security is a top prio…

April 1, 2014

SECURITY

The Security Imperative As Mobility Evolves

Editor’s Note: This post is a response to EN Mobility Workspace. Please see that post for full context. A colleague of mine here at Cisco, Jonathan, recently spoke well to the Evolution of Cisco Mobility Workspace Journey. Like all technologies, there is an adoption and engagement cycle based…

February 20, 2014

SECURITY

Secure Access for the Real World, Really?

Yes, really. I just got back from Cisco Live! Milan where Chris Young, Senior VP at Cisco, spoke to the Cisco security story, Intelligent Cybersecurity for the Real World. The Cisco security strategy addresses many security challenges across a range of attack vectors (network, endpoint, mobile devic…

February 5, 2014

SECURITY

Can You Guess Your ROI on Your Secure Access?

No need to guess now! Cisco commissioned Forrester Consulting to examine the business value and potential return on investment (ROI) enterprises may realize by implementing Cisco Identity Services Engine (ISE)—a leading secure access solution. This is available in the recently published Forrester TE…

January 23, 2014

SECURITY

Security Realities of IoT (Internet of Things)

Are you a security professional or IT professional just resolving the security issues with BYOD (bring-your-own-device)? Watch out, BYOD was a precursor or warm up exercise to the tsunami just hitting your shores now. The SANS Institute just completed a survey on the security viewpoints on IoT, pred…

January 9, 2014

SECURITY

2014: More Secure Access, Please

Are you back from holiday break all refreshed and ready to embrace 2014 with confidence? Many organizations will see new devices on their networks given the recent massive holiday gift giving. In particular, educational organizations will be morst likely to be impacted. It seems there was no new hot…

December 18, 2013

SECURITY

Beware: Insider Threats Getting Worse

Most recently ESG/Vormetric came out with a threat report that highlighted the increase in insider threats & the significance to augment perimeter and host-based security. The rationale behind the increase was that more people are accessing the network, increase cloud and network traffic are mak…

November 4, 2013

SECURITY

Education Embraces the Mobility Excitement

Let’s examine and consider mobile devices in education. Students need to become more tech savvy to compete in today’s economy, and mobile devices offer supplemental learning and a new style to learn. A recent report noted that educators see great potential in mobile technology for transf…

October 14, 2013

SECURITY

A Financial Service Organization Speaks Out on Secure Access

Are your finances secure with your financial institution? Vystar Credit Union in Florida, USA speaks out on one of their recent efforts to ensure highly secure access at their institution. With the pressures of compliance and the need to protect their institution’s network and assets, Vystar deploys…