ISE

January 29, 2020

SECURITY

Securing Industrial IoT

It’s hard to ignore the ubiquity of the internet of things (IoT). Even if you’re one of those holdouts that doesn’t own consumer IoT devices such as a smart speaker, internet-connected thermostat, or a smart watch, industrial IoT (IIoT) devices—a subset of the IoT landscape—are already playing a par…

January 7, 2020

NETWORKING

Enterprise Networking Business 2019 Year in Review

Towards the end of this busy and innovative year, Cisco leadership decided to combine several businesses under one leader, SVP/GM Scott Harrell, to create the Intent-Based Networking Group. So, what is the meaning in a change of names? The new organization consists of engineering and product marketi…

September 11, 2019

SECURITY

Ingredients Needed to Manage Network Tribbles

Cybersecurity – the final frontier, these are the trials and tribulations that network admins face on an ongoing basis. Sometimes it feels like network admins are Starfleet captains navigating unknown galaxies as the infrastructure of organizations become more complex.  Using a complicated mix of cl…

September 10, 2019

NETWORKING

Business Benefits of Segmentation with Software-Defined Access

The goal of moving applications to the cloud and integrating with SaaS platforms is to satisfy the growing demand for connectivity to data resources and applications at any time, from anywhere. However, achieving that goal with high levels of Quality of Experience (QoE) for applications depends on t…

January 15, 2019

GOVERNMENT

3 Keys to Enabling DoD’s Comply-to-Connect

Co-author: Chad Mitchel  |  DoD Technical Solutions Architect at Cisco     The U.S. Department of Defense (DoD) has long been on the forefront of technology innovation when it comes to increasing mission success. But as technology evolves, so does the cybersecurity threat landscape. This m…

November 20, 2018

SECURITY

MobileIron UEM Certified as Cisco Security Connector Compatible

Expands support with Cloud Integration MobileIron was one of the first integration partners with Cisco Security Connector (CSC) for supervised iOS devices. This fall, they expanded their Unified Endpoint Management (UEM) support from on-premise to include the cloud, and both of the integrations are…

August 26, 2018

SECURITY

Protecting SugarCreek’s 24/7 Food Manufacturing Across Four States

SugarCreek Brandworthy food solutions is a growing, mid-western food manufacturer helping some of the industry’s largest and best-known companies develop innovative food solutions. SugarCreek’s authentic culinary expertise helps drive innovation. Their in-house expertise, in everything from food tre…

August 1, 2018

NETWORKING

Shining a Light on Shadow IT

I touched on the problem of Shadow IT in the expanding world of IoT in a previous blog A Security Fabric for IoT. But there is another ecosystem of applications and hardware besides IoT devices to manage in the realm of Shadow IT. From the old days of departments buying OTS packaged software for spe…

#SHOWMESECURITY: Protect Network Assets with a Security Strategy

Cybersecurity was a main topic at the recent IP Visions Conference and Expo in St. Louis, MO this week. Cisco hosted a pre-conference workshop on Monday and cybersecurity was referenced in all the topics; three out of the five session’s main discussion points focused around cybersecurity. CCI was ho…