Avatar

Scott Pope

Director, Product Management & Business Development

Security Technical Alliances Ecosystem

Scott Pope has held positions in network engineering, market strategy and technical product management at global service providers and networking equipment vendors covering a wide range of data and voice networking technologies. Since 1998 Scott has driven product strategy for many aspects of network security ranging from VPN and firewall to threat management for both wired and wireless networks. Scott currently concentrates his efforts on the Cisco Security technology partner ecosystem, as well other industry partnerships across the Cisco security portfolio.

Articles

August 14, 2019

SECURITY

Breath Deeply, Relax…Now Focus…on Integrating Your Security Architecture

“Relax” and “security” are not often found in the same sentence.  There is not much about the current threat environment that elicits relaxation. But in this era of mindfulness and getting focused, Cisco has done just that.  We have put a single-minded focus on integrating our own security portfolio…

September 27, 2018

SECURITY

A Cisco & Splunk Security Integration Everyone Should Be Using

Connect the dots of endpoint visibility and use it as a threat and compliance early warning system Splunk’s annual user conference, .conf18, kicks-off next week in Orlando.  Cisco will be there in a big way given the depth and breadth of our Splunk security integrations.  But I wanted to shine a lig…

September 19, 2018

SECURITY

How Alliances Strengthen Your Cybersecurity Defenses

When we started the Cisco Security Technology Alliance (CSTA) a few years ago, we didn’t envisage it growing into such a large ecosystem of technology spanning the breadth of our Cisco Security portfolio in such a short span of time. But security is most effective when it works as an integrated syst…

August 14, 2018

SECURITY

Security Automation: Putting the odds ever in your favor

Co-authored by Emily Skahill “May the odds be ever in your favor…” It was the irony of this pithy statement that sent the Hunger Games heroine, Katniss Everdeen, to an almost certain death. A dramatic reminder that we should never take “the odds” for granted. Against the backdrop of attacks like Wa…

June 5, 2018

SECURITY

It’s Time to Turn Your Access Control Perimeter into a Threat Control Perimeter

Your Security ‘Game Plan’: Is it Reactive or Proactive? In soccer, the name of the game is to play offensively rather than defensively. A good soccer team keeps the ball on the opponent’s side – and when it does penetrate those frontlines, the defensive players are prepared to fend off the threat. L…

November 15, 2017

SECURITY

Enabling Collaborative Security Through Openness

Expanding the Cisco Security Technology Ecosystem Today we are delighted to announce that the Cisco Security Technology Alliance (CSTA) is adding 26 technology integrations to expand its partner ecosystem to over 140 partners representing 225+ product platform integrations. Some of these integration…

October 18, 2017

SECURITY

Joining Forces for Cybersecurity Openness – Cisco pxGrid and McAfee OpenDXL

Interoperation of two leading security integration frameworks delivers unprecedented breadth in multi-vendor collaboration.  Simplifies security vendor integration for customers. There is strength in numbers.  Here the strength is in the number 2, because it equals almost 100.  Funny math you say? …

September 28, 2016

SECURITY

Creating a “Kill Switch” in the Cybersecurity “Kill Chain”

“Kill chain,” a cybersecurity term coined by Lockheed Martin, is shorthand for how cyber criminals target, recon, develop, and eventually penetrate their targets.  It’s among the hottest buzzwords in the cybersecurity industry right now, with many security products talking about how they address the…

June 28, 2016

SECURITY

Better Security Through Openness and Multi-Vendor Integration

Cisco Further Expands Technology Partner Ecosystem – New Partners and New Tech Integration Areas  Security is an interconnected system, not a bunch of disparate boxes.  Like a school of fish, security should operate collaboratively to accomplish a goal. Not just for the sake of “integration”, but b…