encryption
Admins Achieve More With Webex: Reduce Cost By Integrating with Microsoft IT Tools and Enjoy Webex Native Security Capab …
Simplify Deployment and Reduce Total Cost Of Ownership (TCO) IT administration can often be complex and challenging. In order to deploy, operate and assure mission critical collaboration services, IT admins need to integrate disparate solution components in an often complex environment. And at the s…
Cisco Webex – Building and Maintaining Trust with Collaboration Administrators
Collaboration Administrators have an unenviable job. Not only do they have to cater to demanding end users who want the best experience, they also have to deal with other functions in a typical IT organization – such as – legal, security and compliance. Often, requirements from those functions are a…
Putting the “Trust” in Trustworthy SD-WAN
Organizations are implementing SD-WAN to bring secure, cost-effective, and efficient connectivity to distributed branches, retail outlets, and an increasingly distributed workforce. Top of mind for IT when expanding remote connectivity is ensuring the security and integrity of remote network applian…
Fighting for Encryption & Security Around the World
Last week, my colleagues Tim Fawcett, Matt Carling and I had the honor and pleasure of representing Cisco in a hearing before the Australian Parliamentary Joint Committee on Intelligence and Security. The topic: pending legislation to expand the government’s lawful surveillance authorities – called…
The Impact on Network Security Through Encrypted Protocols – QUIC
I have already written about two secure protocols that are impacting our network security. The first was HTTP/2, the second one was TLS 1.3. Both posts can be found here: HTTP/2 TLS1.3 Today I want to talk about another very important protocol, it is called QUIC. QUIC stands for QUICK UDP INTERNET C…
A Guide for Encrypted Traffic Analytics
By now, you’ve heard of Encrypted Traffic Analytics, Cisco’s latest innovation that allows organizations to leverage the network to find threats in encrypted traffic. Wondering why this is big news? Consider these statistics (Gartner and NSS Labs): … 63 million new devices are attaching to enterpris…
Who’s Afraid of Modernization?
Everybody knows that modernizing legacy systems brings better security along with all of the other improvements in power and efficiency. It seems, however, that despite what everybody knows, a large number of federal IT leaders don’t believe it. A recent survey showed that 59 percent of respondents…
Prevent an Encryption Bottleneck on High-Speed Links
What if you had a car with a powerful, turbo-charged engine that could fly along at 130 mph —until you turned on the air conditioner and watched the max speed drop to 50? Pick up two friends, and it struggles to maintain 30 mph. This would be depressing for you as a driver, but it does make a good a…
Collaboration at #CLUS, Final Wrap: “Ahh, the Cloud” and Endangered Chickens
It definitely took the long weekend to recover from the energy of Cisco Live. From the keynotes to the innovation talks to the DevNet Zone and the show floor, I definitely got my convention center mileage numbers. I’m probably due for an oil change. The good news is that some of those footsteps are…
1