ISE

February 28, 2017

PERSPECTIVES

#CiscoChampion Radio, S4|Ep. 2: Security and ASICs

#CiscoChampion Radio is a podcast series by Cisco Champions as technologists. Today we’re discussing Security and ASICs. Get the Podcast Listen to this episode Download this episode (right-click on the episode’s download button) View this episode in iTunes Cisco Guest Dave Zacks (@davezacks), Dist…

December 19, 2016

SECURITY

To be Effective, Security Needs to Be a Force Multiplier

Effective security is simple, open, and automated.  We’ve already talked about simple and open. Now let’s talk about automated. Security admins can relate to this scenario. You just learned of an infected system in your environment of thousands of devices. How many others are affected? That’s hard t…

December 1, 2016

HEALTHCARE

Protecting Clinical Devices – the Achilles Heel of Healthcare

Everyday, hackers and cybercriminals are infiltrating networks. And they are especially interested in healthcare. That’s because stolen medical records are profitable, selling up to 10 times more than credit card numbers on the black market. But even more lucrative than identity theft is a ransomwar…

August 18, 2016

SECURITY

How Cisco ISE Customers Saved Over $17 Million

Today, thousands of Cisco customers are using the Identity Services Engine for guest and BYOD access. Naturally they want their users to have a great experience with great looking portals that’s consistent with their company brand. Custom portal creation typically requires technical and design exper…

Kuwait Oil Company Gets More Secure

You may be well aware of the cyberattacks on retailers and banks, but did you know malware encounters are on the rise in the energy and oil & gas sectors? The findings of the Cisco Annual Security Report may shock you. The 2012 breach of Saudi Aramco’s network disabled thousands of compute…

June 9, 2016

NETWORKING

ISE Express Packs the Best Price with the Best Performance

You just set up your entire network using Cisco products and it was incredibly easy. But now you have a question: how do you make sure that your network and your data stays secure? Certainly the safeguard for running security must be time-consuming to set up, a bear to maintain and incredibly expens…

June 7, 2016

NETWORKING

If you’re transforming to digital you’d better have integrated security. Here’s why.

So you’re transforming to a digital network. Are you thinking your current security technologies are going to work? You might want to think twice, because all those new mobile and IoT devices on your network get infected with advanced threats pretty easily. And your old defenses probably aren’t as g…

May 11, 2016

GOVERNMENT

Cybersecurity for Defense: Network Segmentation

Classifying and compartmentalizing information has been around within the Department of Defense before it was even called the Department of Defense. However, as DOD information that was once secured in vaults and safes has become digital data, many new regulations have been introduced that mandate h…

March 24, 2016

NETWORKING

Double Click: Sup6T Software Services for Digital Business

The digital transformation of business is fueled by several megatrends – Mobility, IoT, Analytics and Cloud. First, mobile traffic is expected to exceed wired traffic by 2017. Second, IoT devices will triple by 2020. Third, 75% of all companies are planning to, or are already, investing in Big Data.…