Identity Services Engine
Business Benefits of Segmentation with Software-Defined Access
The goal of moving applications to the cloud and integrating with SaaS platforms is to satisfy the growing demand for connectivity to data resources and applications at any time, from anywhere. However, achieving that goal with high levels of Quality of Experience (QoE) for applications depends on t…
Protecting SugarCreek’s 24/7 Food Manufacturing Across Four States
SugarCreek Brandworthy food solutions is a growing, mid-western food manufacturer helping some of the industry’s largest and best-known companies develop innovative food solutions. SugarCreek’s authentic culinary expertise helps drive innovation. Their in-house expertise, in everything from food tre…
Security Automation: Putting the odds ever in your favor
Co-authored by Emily Skahill “May the odds be ever in your favor…” It was the irony of this pithy statement that sent the Hunger Games heroine, Katniss Everdeen, to an almost certain death. A dramatic reminder that we should never take “the odds” for granted. Against the backdrop of attacks like Wa…
Shining a Light on Shadow IT
I touched on the problem of Shadow IT in the expanding world of IoT in a previous blog A Security Fabric for IoT. But there is another ecosystem of applications and hardware besides IoT devices to manage in the realm of Shadow IT. From the old days of departments buying OTS packaged software for spe…
Setting the standard: Cisco ISE wins trust award for best NAC solution at SC Awards 2018
Many professional athletes would say that while winning the first championship is unforgettable, its winning back-to-back championships—or even accomplishing the rare three-peat—that carries special meaning as it requires an enduring focus and a consistent commitment to excellence to achieve the hig…
Enterprise Network Security: Is it in your DNA?
If you were driving a race car without brakes, chances are you’d keep your speed in check. How else could you manage the corners? Pushing the pedal-to-the-metal on the straightaways and actually reaching the car’s peak performance would only end poorly when the road turns. The same can be said for e…
Kuwait Oil Company Gets More Secure
You may be well aware of the cyberattacks on retailers and banks, but did you know malware encounters are on the rise in the energy and oil & gas sectors? The findings of the Cisco Annual Security Report may shock you. The 2012 breach of Saudi Aramco’s network disabled thousands of compute…
Cybersecurity for Defense: Network Segmentation
Classifying and compartmentalizing information has been around within the Department of Defense before it was even called the Department of Defense. However, as DOD information that was once secured in vaults and safes has become digital data, many new regulations have been introduced that mandate h…
Hosted Identity Services: Scaling Security in the Age of Mobility
The rapid expansion of connected devices is a double-edged sword for businesses. On one hand, mobility, cloud, and BYOD innovations enable unprecedented flexibility, collaboration, and ease of access for employees. Fifty percent of employers will adopt BYOD policies by 2017, and 90 percent of Americ…
3