visibility
Enforce Endpoint Compliance and Cyber Hygiene With Duo Device Trust
Cisco’s recently released their 2020 CISO Benchmark Report that makes several key recommendations for security professionals to achieve a zero trust vision. The following are a couple of recommendations that are relevant to the discussion in this blog regarding device trust: More than half (52%) of…
Datacenter Security: How to Balance Business Agility with Great Protection
When IDC consults with enterprise customers or performs worldwide surveys, security is invariably an acute concern. That’s regardless of geography, industry, and identity of respondent (executive, LoB, IT, DevOps, etc.). While the challenge of providing protection and security extends across all pla…
It’s 9am. Do you know where your data is?
‘Data center anywhere’ requires security everywhere It’s 9am. Do you know where your data is? If you’re like most businesses today, it’s everywhere. Your data center is no longer a physical place – it’s wherever your data is – on-premises, in SaaS-based applications, and in public clouds. In fact, G…
Five Network Security Horror Stories
Network visibility is crucial to running a strong network security practice. Oftentimes when organizations first deploy Cisco Stealthwatch, it uncovers previously unknown risky or suspicious activity on the network. In some cases, it detects an outright breach. With Halloween right around the corner…
Why is intent-based networking good news for software-defined networking?
In a previous blog post Cisco Engineering teams looked “under the hood” at intent-based networking. A common question we receive is: “What is the relationship of software-defined networking (SDN) to intent-based networking?” In this blog we: Compare the model of SDN with intent-based networking: H…
3 Non-Negotiables for an Effective Data Center Security & Workload Protection Strategy
We know that big data is big business… And the use of on-premises and public cloud infrastructure is growing, according to the Cisco 2018 Security Capabilities Benchmark Study. In the 2017 study, 27 percent of security professionals said they are using off-premises private clouds, compared with 25 p…
Boring is the New Awesome
The core principle of model-driven telemetry is super simple: as much usable data out of the network as fast as possible. The implementation is also pretty subtle: a push mechanism, data models, open-source encodings. In fact, it’s all so simple and subtle that some folks look under the hood and…
Digital Manufacturing Drives Innovation at Daimler Trucks
Co-Authored by Joe Kann, Rockwell Automation Innovative manufacturers are realizing the value of the Industrial Internet of Things (IIoT) by mapping out use cases that translate to immediate business value and outcomes. In fact, manufacturing represents the largest global industry with “digital val…
General Motors Prevents Factory Downtime with Connected Machines
Factory workers often learn about issues with their production machinery too late – after the line shuts down. For example, a robot used in Automotive Body in White production may suddenly break down or start yielding poor-quality welds. This can be disastrous for final assembly, halting outpu…