Service Provider
Advancing your programmability journey with latest IOS XR innovations
I’m happy to welcome NANOG (October 2-4, 2017) back to Cisco’s hometown, San Jose. It’s only the fourth time in its history that NANOG is hosting its major event here—the last time was in 2008. Cisco has always been a strong supporter of NANOG, and again we’re all in. Let me give you some insight in…
For Telecom service providers, cyber security is not an add-on
A rigorous and holistic approach to cyber security is critical for service providers, because trust is at the heart of their business Cyber attacks are a growing risk for organisations of all types. But security breaches can be particularly damaging for service providers, because their network infr…
Why network security is like a beehive
Effective threat protection means thinking about security before, during and after an attack Network security involves cutting edge technology. But it also follows principles that have long existed in nature. In fact, we can learn a lot about effective security by looking at the way bees defend the…
If you want to get to grips with cyber security, look at the big picture
An integrated architecture can help service providers get the upper hand over the ever-increasing range of cyber security threats I’ve visited RSA, the world’s biggest internet security conference in San Francisco, for the past few years. And it’s really brought home to me how fast the world of cybe…
New ICT Opportunities with ITaaS
Digital Transformation is transforming businesses and our lives everywhere. The first step in your digital transformation journey is understanding what it means to your industry. For communication service providers(CSP), it means using technology to radically improve performance and reach of service…
Good network security means thinking holistically
Combating hackers is tough. They’re always out there, searching for new ways to attack. But for effective network security, Telecom service providers can learn something from nature. And look at the way that bees protect their hive from bears. Here is the story SECURITY BEFORE, DURING AND AFTER AN…
IBC 2017: A Media Blueprint for the Intersection of Sports and the Transition to IP
Written by Joey Bischof, Sales Lead – Sports Broadcaster & Leagues Sports: Few (if any!) other categories of live entertainment garner as much “return on emotion,” to borrow a clever phrase coined by my colleagues over at EVS. And they’re right. Consider this: Sports is the least time-shif…
IBC 2017: Cloudian, Cisco, and Important Trends in Media Storage
It’s been a few months since we’ve reported in on the storage trends we’re seeing in the media and entertainment segment. Last time was at the 2017 NAB Show, in April, when object-based storage was the big thing (still is.) Why, because more and more content providers want a way to store video in th…
Looking for the most refined weapon to combat piracy? Use data
By Orly Amsalem, data scientist at Cisco Who is Stealing Credentials? Imagine a hacker. You’re probably visualizing a blurred image in a white mask or a black hoodie, typing lines of code, determined to hack into secure sites, steal credit cards, and collect valuable, previously private data. Now i…
1