#Security
Three New Security Realities That Every CSO Should Face
Anyone responsible for keeping their Enterprise information secure has to understand three events that have changed the nature of Cyber-Security forever: 1. The Perimeter has Disappeared There used to be a strong perimeter defined by the network endpoints, which were all inside secured corporate bui…
23 Days. And Counting.
“It’s in TWENTY-THREE DAYS” I tell my kids. “Our trip to Disney?!?! They inquire excitedly. “Disney…what? No! That’s not for a while. I’m talking about PARTNER SUMMIT” is my pithy response. As they roll their eyes and look mildly disappointed I regale them with stories about the event. They retort w…
Five More Technologies Every IT Employee Should Know About
After my last blog post was published, Five Technologies that Every IT Employee Should Know About, one reader commented, “There has got to be more than five.” Yes, there are at least five additional compelling technology topics to know. Here are my choices to complete a “Top 10” list. Securi…
Micro Segmentation and Cisco ACI – From Theory to Practice Part IV
This is Part IV in a four part series of blogs. This blog has been co-written with Vincent Esposito (@vesposit) This is the last of a series of blogs dedicated to explaining some of the use cases that can leverage ACI Micro Segmentation capabilities. In the first blog we described how to use ACI mic…
Tetration Analytics: A Limitless Time Machine For Your Data Center
In the film Limitless, the main character Eddie finds himself able to learn and analyze information at a superhuman rate. He temporarily has the ability to instantly and meaningfully cross-correlate all of the previously forgotten experiences from his past (1) and assess multiple scenarios in the fu…
Cisco @ NAB: Is Your Media Business Secure? (Are You Sure?)
By Michal Brenner, Marketing Manager, Service Provider Video Software and Solutions, Cisco In the global digital revolution unfolding around us, the media broadcast segment is particularly well-stocked with opportunity. It’s well proven (time and time again!) that direct-to-consumer video delivery b…
Customers Speak Out On ACI: Speed, Simplicity & Security
Speed, simplicity and security – these are 3 of the recurring themes that come up in conversations with customers when discussing ACI. Why? Because ACI addresses 3 fundamental problems that seem to be consistent with people running data centers – across vertical markets, geographies and organization…
Oxymoronic or Not? Legacy Next Generation Firewalls…
The term NEXT-Generation, (especially when it comes to firewalls…) has been around awhile…to the point that I almost think NOW-Generation may be a more accurate term. There has been too much focus on application & access control and we have forgotten about threat defense. How do you know i…
The Data Center Has Changed Forever
Everything about the data center today has changed, driven by the applications that run in it. Today’s data center apps have undergone a fundamental architecture shift from monolithic, shrink-wrapped packages to a collection of microservices that are assembled and reassembled in a continuous develop…
3