Cisco ISR
Integration: The Civilized Approach to Securing Your Branch
Same battle, different day: Our branch offices demand speedy access to the same flexible capabilities as everyone back at corporate—mobility, BYOD, guest Wi-Fi, cloud services—but they don’t have corporate’s expertise or the space to run full security operations. Speed, flexibility, costs, and secur…
Protect the Branch with Stealthwatch Learning Network License
The threat environment faced by organization deploying branch networks continues to evolve. It’s time for a disruptive approach to handling network security across many distributed branch sites. Automation is becoming a requirement, because the growing volume and complexity of the threats to data se…
Ignite Your Enterprise Digital Journey in Three Steps
It’s been a few exciting weeks recently at Cisco. On the heels of Cisco and Apple innovations for iOS 10, came the Tetration Analytics announcement to provide pervasive visibility across everything in your data center in real time. Now, I am ecstatic to continue that momentum with an update to our D…
Branch Direct Internet Access: is your branch office secure?
With the recent launch of FirePower Threat Defense on Cisco 4000 Series Integrated Services Routers, I would like to spend some time talking about enterprise branch security and what are the requirements to keep in mind to secure your branch office. Let’s start out by examining your branch environme…
Defending Your Console
A new problem has arisen in CCNA class: We have a lab that asks the students to enable a debug command; the debug overruns the console buffer to the extent that commands cannot be entered, and this goes on for more than an hour! In my 15 years of teaching CCNA classes, we have always taught the dang…
The Evolution of Branch Connectivity
Over the past few weeks I’ve had the chance to come up from my rabbit hole of deployment projects and catch up on the tech news. In particular, the announcement at Interop New York where Cisco announced the new ISR 4400 family of routers along with a few other articles got me to thinking about…
IWAN Wed: Securing Your Transport Independence with DMVPN
In my last blog I talked about the value of Pfr to the IWAN solution. This week I wanted to talk about DMVPN and why it is going to be a critical component of your IWAN deployment. Your IWAN topology will most likely consist of one or more internet connections which means that your data will be trav…