TrustSec
Protecting the Crown Jewels
Why do so many organizations maintain essentially open, “flat” networks, leaving thousands of users and devices with network-layer reach to their “crown jewels”? Especially in light of what we know with data breaches, theft, and loss? One possibility may be that some organizations simply grew too qu…
Just Announced at Cisco Live! Milan – Cisco is Opening TrustSec Capabilities to Other Vendors
With encouragement from customers, Cisco has submitted the TrustSec protocol that we use to exchange role and context information between network devices to the IETF. Chris Young, Senior Vice President of Cisco Security, shared the news during his keynote address at Cisco Live! Milan. The Source-gro…
Security: Front and Center at Cisco Live Cancun 2013
This year I was honored to be able to present and participate at Cisco Live Cancun, which took place last week. Many attendees from North, Central and South America and the Caribbean came to discover innovative ways that networking technologies can help them reach new markets and understand which so…
[Summary] How Secure Is Your Mobile Worker?
Let’s start with how well do you know your mobile worker? Understanding the mobile worker’s perceptions and behaviors will offer a better view on the potential security implications your organization must manage. Cisco just released new global research (white paper) , Cisco Connected World Intern…
How Secure is Your Mobile Worker?
How well do you know your mobile worker? Understanding the mobile worker’s perceptions and behaviors will offer a better view on the potential security implications your organization must manage. Cisco recently released a new global infographic and white paper, the Cisco Connected World Internationa…
MegaTrends: Cisco TrustSec from User Access to the Data Centre
In my previous Blogs I have talked about Megatrends including BYOD, the Next-Generation Workspace, Video and the Internet of Things. One unfortunate reality all of these trends have in common is that they are going to put additional stress on your current Network and Security Infrastructure and Oper…
MegaTrends: The Need for Securing Data Center Traffic
Data Centres are evolving rapidly, in response to the many industry IT Megatrends we have previously discussed. Services and applications are increasingly being delivered from very large data centres and, increasingly, from hybrid and public clouds too. Specifically, a good example of services being…
Using TrustSec to simplify Virtual Desktop Infrastructure (VDI) deployment
We recently discussed the perfect IT storm that is currently brewing in business. BYOD, Unified Access, Video, the Many Clouds, SDN… all happening at once, on current infrastructure, and yet demanding more. Some of the comments you made further emphasized the need to have an architectural approach.…
Judge for yourself: Taking Dell to task on “holistic” security claims
In case you missed it, Network World’s Ellen Messmer published a rather surprising article on how Dell was going to “trump” Cisco in the information security market as a result of some recent acquisitions. Now certainly Dell is entitled to their beliefs. They’re in a difficult position right now, as…