security
Your Right to Choose Your WAN Connectivity and Your Right to Security
Still too often, nowadays, I look at my phone and my stomach drops. I see: “3G”… Even worse, I see: “1x”… I think to myself: It’s the year 2015 and the world is becoming increasingly digitized. IDC’s Internet of Things Forecast states that there will be 4 billion people using 50 billion devices all…
Connected Health News, Fall 2015 Edition
Have you read the latest Cisco Connected Health newsletter? We encourage you to explore the customer success stories, white papers, and videos to learn new and innovative ways to provide your caregivers with highly secure and reliable access to health information, regardless of location. Apple and C…
An introduction to the new Cisco Network Visibility Flow Protocol (nvzFlow)
As recently announced, Cisco AnyConnect 4.2 extends visibility to the endpoint with the Network Visibility Module (NVM). Users are one of the most vulnerable parts of any security strategy, with 78% of organizations saying in a recent survey that a malicious or negligent employee had been the cause…
Bringing Context-Aware Security to Applications
Are you really who you say you are? This has long been the key question and the key challenge in managing user access to corporate networks and IT systems. In recent years, capabilities for context-aware security have expanded this WHO question to identify the WHAT, WHEN, WHERE, and HOW details for…
The Importance of Security Skills in Today’s Workplace
Information technology and its use have transformed every aspect of society. In today’s digital economy, every company requires effective security to protect their information. Security breaches mean lost intellectual property, compromised customer information, and reduced customer confidence. These…
Cisco Security Workshop at OilComm 2015
Get the edge and agility to innovate, compete, and win with Cisco’s digital solutions for oil and gas. Connect machines, assets, and people across your business with proven architectures and technologies. Secure it all from board room to field worker to remote, unmanned site. Ever wondered about how…
European Utility Week Showcases Cisco Leadership
Guest blog by Philippe Couturaud, Cisco Business Development Manager, EMEAR Utilities: This week you have the opportunity of meeting up with Cisco at the European Utility Week event in Austria. Cisco has become synonymous with providing advanced critical infrastructure for our utility customers enab…
AMP Threat Grid Extends and Bolsters Our Ability to Combat Malicious Malware
New, clever, and dangerous malware is being devised all the time. After a piece of malware is well known, signature-based defenses such as antivirus and other detection and prevention tools can catch it. But what about new, increasingly insidious malware that isn’t well known? Last year, Cisco acqui…
Agility is the New Smart
As businesses strive to become digital, they need to be more flexible, innovative, and agile than ever. Customers are engaging with businesses differently from how they were just five years ago, and the bulk of their interactions are not with people but with systems (think airport and hotel check-in…