ISE
#CiscoChampion Radio, S4|Ep. 2: Security and ASICs
#CiscoChampion Radio is a podcast series by Cisco Champions as technologists. Today we’re discussing Security and ASICs. Get the Podcast Listen to this episode Download this episode (right-click on the episode’s download button) View this episode in iTunes Cisco Guest Dave Zacks (@davezacks), Dist…
To be Effective, Security Needs to Be a Force Multiplier
Effective security is simple, open, and automated. We’ve already talked about simple and open. Now let’s talk about automated. Security admins can relate to this scenario. You just learned of an infected system in your environment of thousands of devices. How many others are affected? That’s hard t…
Protecting Clinical Devices – the Achilles Heel of Healthcare
Everyday, hackers and cybercriminals are infiltrating networks. And they are especially interested in healthcare. That’s because stolen medical records are profitable, selling up to 10 times more than credit card numbers on the black market. But even more lucrative than identity theft is a ransomwar…
How Cisco ISE Customers Saved Over $17 Million
Today, thousands of Cisco customers are using the Identity Services Engine for guest and BYOD access. Naturally they want their users to have a great experience with great looking portals that’s consistent with their company brand. Custom portal creation typically requires technical and design exper…
Kuwait Oil Company Gets More Secure
You may be well aware of the cyberattacks on retailers and banks, but did you know malware encounters are on the rise in the energy and oil & gas sectors? The findings of the Cisco Annual Security Report may shock you. The 2012 breach of Saudi Aramco’s network disabled thousands of compute…
ISE Express Packs the Best Price with the Best Performance
You just set up your entire network using Cisco products and it was incredibly easy. But now you have a question: how do you make sure that your network and your data stays secure? Certainly the safeguard for running security must be time-consuming to set up, a bear to maintain and incredibly expens…
If you’re transforming to digital you’d better have integrated security. Here’s why.
So you’re transforming to a digital network. Are you thinking your current security technologies are going to work? You might want to think twice, because all those new mobile and IoT devices on your network get infected with advanced threats pretty easily. And your old defenses probably aren’t as g…
Cybersecurity for Defense: Network Segmentation
Classifying and compartmentalizing information has been around within the Department of Defense before it was even called the Department of Defense. However, as DOD information that was once secured in vaults and safes has become digital data, many new regulations have been introduced that mandate h…
Double Click: Sup6T Software Services for Digital Business
The digital transformation of business is fueled by several megatrends – Mobility, IoT, Analytics and Cloud. First, mobile traffic is expected to exceed wired traffic by 2017. Second, IoT devices will triple by 2020. Third, 75% of all companies are planning to, or are already, investing in Big Data.…
1