secure access
Cisco Security & Trust at Cisco Live US
At Cisco, cybersecurity is our top priority; from product development, to operations, to data protection and privacy, we are embedding security everywhere. Our journey starts with protecting the Cisco enterprise. We invite you to learn more about how we securely enable business for our customers, pa…
The Journey to Secure, Intent-based Networking in a Multicloud World
Earlier this morning, Cisco announced its intent to acquire Duo Security. In and of itself, this acquisition has been several months in the making by an impressive team of professionals who understood exactly what could be accomplished together. For me personally, it marks a strategic milestone on a…
Do you trust the endpoints connecting to your network?
Trust gets a bad rap in the security industry, but in reality, it’s a necessary part of any relationship. Without trust, today’s organizations couldn’t function, and productivity would come to a screeching halt. The thing is – how do you know that the devices coming onto your network are trustworthy…
Secure Access for the Real World, Really?
Yes, really. I just got back from Cisco Live! Milan where Chris Young, Senior VP at Cisco, spoke to the Cisco security story, Intelligent Cybersecurity for the Real World. The Cisco security strategy addresses many security challenges across a range of attack vectors (network, endpoint, mobile devic…
Can You Guess Your ROI on Your Secure Access?
No need to guess now! Cisco commissioned Forrester Consulting to examine the business value and potential return on investment (ROI) enterprises may realize by implementing Cisco Identity Services Engine (ISE)—a leading secure access solution. This is available in the recently published Forrester TE…
2014: More Secure Access, Please
Are you back from holiday break all refreshed and ready to embrace 2014 with confidence? Many organizations will see new devices on their networks given the recent massive holiday gift giving. In particular, educational organizations will be morst likely to be impacted. It seems there was no new hot…
Access Control with Cisco TrustSec: Moving from “IP Addresses” to “Roles and Attributes”
Today’s enterprise is a highly dynamic, and hyper connected environment where IT plays a critical role in connecting the users, devices, resources and corporate IT systems. Today’s employees are also highly mobile in nature and do not necessarily have a single workspace assignment. The IT department…
Beware: Insider Threats Getting Worse
Most recently ESG/Vormetric came out with a threat report that highlighted the increase in insider threats & the significance to augment perimeter and host-based security. The rationale behind the increase was that more people are accessing the network, increase cloud and network traffic are mak…
Robot Soccer? Staying Connected at Bowdoin College
As our team has prepared for Educause 2013 this week, we have been talking a lot about technology in higher education and how it’s impacting colleges, universities, students and staff. Of course, robot soccer was not the first thing that came to mind, but it’s a great example of how different techno…