ISE
Securing Industrial IoT
It’s hard to ignore the ubiquity of the internet of things (IoT). Even if you’re one of those holdouts that doesn’t own consumer IoT devices such as a smart speaker, internet-connected thermostat, or a smart watch, industrial IoT (IIoT) devices—a subset of the IoT landscape—are already playing a par…
Enterprise Networking Business 2019 Year in Review
Towards the end of this busy and innovative year, Cisco leadership decided to combine several businesses under one leader, SVP/GM Scott Harrell, to create the Intent-Based Networking Group. So, what is the meaning in a change of names? The new organization consists of engineering and product marketi…
Ingredients Needed to Manage Network Tribbles
Cybersecurity – the final frontier, these are the trials and tribulations that network admins face on an ongoing basis. Sometimes it feels like network admins are Starfleet captains navigating unknown galaxies as the infrastructure of organizations become more complex. Using a complicated mix of cl…
Business Benefits of Segmentation with Software-Defined Access
The goal of moving applications to the cloud and integrating with SaaS platforms is to satisfy the growing demand for connectivity to data resources and applications at any time, from anywhere. However, achieving that goal with high levels of Quality of Experience (QoE) for applications depends on t…
3 Keys to Enabling DoD’s Comply-to-Connect
Co-author: Chad Mitchel | DoD Technical Solutions Architect at Cisco The U.S. Department of Defense (DoD) has long been on the forefront of technology innovation when it comes to increasing mission success. But as technology evolves, so does the cybersecurity threat landscape. This m…
MobileIron UEM Certified as Cisco Security Connector Compatible
Expands support with Cloud Integration MobileIron was one of the first integration partners with Cisco Security Connector (CSC) for supervised iOS devices. This fall, they expanded their Unified Endpoint Management (UEM) support from on-premise to include the cloud, and both of the integrations are…
Protecting SugarCreek’s 24/7 Food Manufacturing Across Four States
SugarCreek Brandworthy food solutions is a growing, mid-western food manufacturer helping some of the industry’s largest and best-known companies develop innovative food solutions. SugarCreek’s authentic culinary expertise helps drive innovation. Their in-house expertise, in everything from food tre…
Shining a Light on Shadow IT
I touched on the problem of Shadow IT in the expanding world of IoT in a previous blog A Security Fabric for IoT. But there is another ecosystem of applications and hardware besides IoT devices to manage in the realm of Shadow IT. From the old days of departments buying OTS packaged software for spe…
#SHOWMESECURITY: Protect Network Assets with a Security Strategy
Cybersecurity was a main topic at the recent IP Visions Conference and Expo in St. Louis, MO this week. Cisco hosted a pre-conference workshop on Monday and cybersecurity was referenced in all the topics; three out of the five session’s main discussion points focused around cybersecurity. CCI was ho…
2