TrustSec

January 29, 2014

SECURITY

Protecting the Crown Jewels

Why do so many organizations maintain essentially open, “flat” networks, leaving thousands of users and devices with network-layer reach to their “crown jewels”? Especially in light of what we know with data breaches, theft, and loss? One possibility may be that some organizations simply grew too qu…

January 28, 2014

SECURITY

Just Announced at Cisco Live! Milan – Cisco is Opening TrustSec Capabilities to Other Vendors

With encouragement from customers, Cisco has submitted the TrustSec protocol that we use to exchange role and context information between network devices to the IETF. Chris Young, Senior Vice President of Cisco Security, shared the news during his keynote address at Cisco Live! Milan. The Source-gro…

November 12, 2013

SECURITY

Security: Front and Center at Cisco Live Cancun 2013

This year I was honored to be able to present and participate at Cisco Live Cancun, which took place last week. Many attendees from North, Central and South America and the Caribbean came to discover innovative ways that networking technologies can help them reach new markets and understand which so…

August 27, 2013

NETWORKING

[Summary] How Secure Is Your Mobile Worker?

Let’s start with how well do you know your mobile worker?  Understanding the mobile worker’s perceptions and behaviors will offer a better view on the potential security implications your organization must manage.  Cisco just released new global research (white paper) , Cisco Connected  World Intern…

August 22, 2013

SECURITY

How Secure is Your Mobile Worker?

How well do you know your mobile worker? Understanding the mobile worker’s perceptions and behaviors will offer a better view on the potential security implications your organization must manage. Cisco recently released a new global infographic and white paper, the Cisco Connected World Internationa…

May 16, 2013

NETWORKING

MegaTrends: Cisco TrustSec from User Access to the Data Centre

In my previous Blogs I have talked about Megatrends including BYOD, the Next-Generation Workspace, Video and the Internet of Things. One unfortunate reality all of these trends have in common is that they are going to put additional stress on your current Network and Security Infrastructure and Oper…

April 26, 2013

NETWORKING

MegaTrends: The Need for Securing Data Center Traffic

Data Centres are evolving rapidly, in response to the many industry IT Megatrends we have previously discussed. Services and applications are increasingly being delivered from very large data centres and, increasingly, from hybrid and public clouds too. Specifically, a good example of services being…

April 4, 2013

NETWORKING

Using TrustSec to simplify Virtual Desktop Infrastructure (VDI) deployment

We recently discussed the perfect IT storm that is currently brewing in business. BYOD, Unified Access, Video, the Many Clouds, SDN… all happening at once, on current infrastructure, and yet demanding more. Some of the comments you made further emphasized the need to have an architectural approach.…

February 25, 2013

SECURITY

Judge for yourself: Taking Dell to task on “holistic” security claims

In case you missed it, Network World’s Ellen Messmer published a rather surprising article on how Dell was going to “trump” Cisco in the information security market as a result of some recent acquisitions. Now certainly Dell is entitled to their beliefs. They’re in a difficult position right now, as…