#Security
Security and the Internet of Everything
The theme of this year’s Cyber Security Awareness Month is “Our Shared Responsibility.” At Cisco, security is everyone’s responsibility – from our trustworthy development processes, to innovation enabling our customers and partners to address threats on end points, networks,…
The Foundation for a Business Relevant Network
With the growing influx of new mobile devices, connected things, bandwidth intensive applications and more data, the network is more relevant to business success than ever before. Back in June of 2012, Cisco saw that we needed to move away from multiple network systems loosely linked together to an…
Cisco Meraki Systems Manager Extends Enterprise Mobility Management to the Cloud
The industry is going beyond BYOD—it’s not just about simply connecting the device anymore: the mobile landscape has grown to include apps, devices and content, all of which require security and management. This is no easy task. Enterprise mobility management (EMM) is no longer a nice-to-have for ou…
Unlock The Value of Big Data with Cisco Unified Computing System
Big Data is not just about gathering tons of data, the digital exhaust from the internet, social media, and customer records. The real value is in being able to analyze the data to gain a desired business outcome. Those of us who follow the Big Data market closely never lack for something new to…
Cloudburst: iOS 8 Generates 50% Increase in Network Traffic
Many network engineers recall the iOS7 update on September 18, 2013 as one of the most historic download days of their network’s history. All the more reason for us in the wireless world who anxiously anticipated the September 17 release of iOS8. We asked a few of our customers to monitor the effect…
Step Up to a New Standard in Threat Defense
The 135 Spanish Steps are perhaps one of the most popular tourist attractions in Rome—and this in a city where your alternatives include stunning options like visiting the Vatican, the Colosseum or the Trevi Fountain. And yet, a visitor to the Spanish Steps today is first—and ahead of any chance to…
Why a Next-Generation Firewall Must Be Threat-Centric
In an earlier blog, we discussed the importance of a visibility-driven approach to Next-Generation Firewalls (NGFWs) and the need for capabilities that offer full visibility and contextual awareness into everything on networks since we know you can’t protect what you can’t see. In additi…
A Visibility-Driven Approach to Next-Generation Firewalls
Cisco ASA with FirePOWER Services has redefined the next-generation firewall (NGFW) as an adaptive, threat-focused platform, delivering superior, multi-layered protection, unparalleled visibility, and reduced security costs and complexity. This innovative new solution addresses three strategic imper…
Summary: Midsize Auctioneer’s Network is Fast and Fortified
IDC’s SMB Survey comparing IT spending priorities in 2012 and 2013 concluded that the top three requirements for the network are performance, security and capacity. How is designing a network different for a giant auctioneer different from other mid-sized enterprises? Ritchie Bros. Auctionee…
1