Friday, August 2, 2019

How NASA Taught Me to Shoot for the Stars – and Land at Cisco

What exactly are some “Nice to have” choices for your projects atmosphere? An excellent office - possibly, flexible hrs and lots of career possibilities.

Elke's Very important personel All Access Pass in the NASA Space Center in Houston.

Now consider what's in your “Non-negotiable” list. For me personally, that’s a supporting manager, competitive benefits and creating a difference.

And I’m only some of the one. 64% of Millennials won’t have a job when the business does not have strong Corporate Social Responsibility (CSR) practices!

Within my twenties, I visited the U . s . States after finishing my degree in British. I understood I needed to create - but by what? Where? To whom? The heavens didn’t align until I visited NASA’s Manley Space Center in Houston, Texas and required their half-day Very important personel tour.



It had been priceless! Restricted to just 12 people, the tour should be reserved six days ahead of time. My travel companion and that i nonchalantly known as up yesterday and, low and behold, got your hands on two tickets by sheer luck.

We explored the historic mission control room where all of the Apollo flights were handled and could get so near to the desks that each gauge, dial, and control left us inspired. Nearby was the Worldwide Space Station’s (ISS) mission control room, where we able to talk with the ISS flight controller - who accounts for the billion-dollar station orbiting earth, and also the lives of astronauts on-board. We even saw astronauts at the office within the Neutral Buoyancy Lab - the huge pool NASA uses to coach astronauts to operate inside a weightless atmosphere.

Once we drove from the Manley Space Center for the coast of Texas and switched to the road that will take us to New Orleans, my pal and that i both voiced that people had were built with a bulb moment. What we should wanted to complete, was work across borders, the main thing on technology making a difference. NASA preferably - but regrettably, they weren't searching for any Corporate Communications manager at that time (nor did I imagine they’d hire me!). However, the idea of employed by a company that changes the planet using their technology tied to me for a long time, particularly when I made the decision to maneuver to Singapore and interviewed in my job at Cisco.

When news broke of methods Cisco is collaborating with NASA and connecting astronauts and team people for that anniversary of Apollo 11, something triggered - it had been as though each one of these moments came full circle for me personally. Possibly I can’t state that I fully achieved things i attempted to do this year since I'm not employed by an area agency - however i did other, worth more things.

This helped me hugely proud to get results for Cisco - a business, like NASA, that innovates not only because of its own success, but to create a positive effect on the folks and planet.

From my perspective, this isn't a pleasant-to-have.

We're lucky that advanced technology makes information and connectivity open to more and more people globally than in the past - however, many communities still have a problem with the fundamentals. I wouldn’t want to get results for a business that glosses of these issues, in sole quest for its very own revenues.

You will find countless types of how Cisco helps make the world a much better place, but listed here are a couple of:

  1. Within the Asia Off-shore, China and japan region, Cisco invests in upskilling countless youthful students via our Networking Academy.
  2. Cisco employees also volunteered a sensational 424,000 hrs this past year, for a large number of causes! Cisco even provides five days each year because of its employees to provide back, this really is apart from our regular compensated time off work. I spent my hrs assisting in a fundraiser effort for that Singapore Committee for United nations women, and that i loved taking part in the communal food packing occasions at our Singapore office.
  3. How else is Cisco helping? There exists a Fake News Challenge, whereby we developed an AI formula that evaluates news tales and identifies misleading articles. As well as on a smaller sized scale, 40% in our Bangalore campus is operated by the sun's rays!


This week my 6-year-old daughter, born the next year I visited Houston, requested to visit space camp within the summer time. “But Mother, I would like a camp whereby we really visit space.” - instead of individuals boring ‘regular’ space camps whereby you build rockets and discover about suns and planets, apparently.

Wednesday, July 31, 2019

Is Network Security Complexity Holding You Back?

At its most fundamental level, the goal of network security is a straightforward one. Organizations have to safeguard their people, assets, and also the data that travels across and resides inside their systems. Edge in the game by setting security policies that detail parameters like who or what's permitted to gain access to which sources.

With time, even small organizations build up large libraries of security policies across a number of different security products. That old processes accustomed to create, update and audit these policies be a burden for that IT team and cause numerous trouble for the business.

Research firm Enterprise Strategy Group (ESG) lately surveyed 200 IT and cybersecurity decision-makers to know their thoughts about network security complexity and it is effects. They examine a few of the top challenges facing these organizations today within their new report “Navigating Network Security Complexity.”

It isn't just your imagination. Security gets more complicated.


Unsurprisingly, a big part (83%) of respondents felt that network security has become more difficult within the last 2 yrs. Many reasons exist with this, however the top responses incorporated:

  1. More devices deployed around the network
  2. Increased traffic around the network
  3. The operations team managing more networking and security technologies


Taken together, these responses paint the image of the growing attack surface and growing workload for teams accountable for protecting organizations’ critical assets.



Challenges coming


Do you know the greatest network security challenges facing organizations within the next couple of years? Based on the survey, they're:

  1. Business initiatives being adopted with no proper security participation
  2. Too little dedicated network team
  3. It requires too lengthy to handle network security policies


Companies are innovating in a record pace, plus they aren’t awaiting the safety team. Hiring staff remains challenging, and outdated processes are compounding the problem.

Brace for impact: outages, disruption and knowledge breaches


Nearly another (29%) of organizations stated they possessed a security event caused by network security complexity. The most typical occurrences incorporated network outages, application or network availability, lack of sensitive data, and lost productivity. Because of the critical nature of those risks, it’s obvious that network security management must be addressed when assessing an organization’s risk management strategy.

Recommendations: technology integration, automation, simplification


ESG offers three headline strategies for CISOs coping with network security complexity today. First, search for solutions which are integrated and centrally managed whenever possible. Next, look for solutions that highlight ease-of-use and time-to-value. Finally, organizations should shoot for process automation and employ technology to achieve this.

Whether you’re directly involved with managing your organization’s security policies or otherwise, you’re likely experiencing unwanted effects from the drain these manual tasks might have with an IT department. It’s time for you to prioritize making security policy management more effective, consistent and efficient. Studying the entire research report is a superb spot to get began.

Simplify network security management with Cisco Defense Orchestrator


At Cisco, we’re spending so much time to assist our customers streamline their security operations. Cisco Defense Orchestrator is really a cloud-based security policy and device manager that utilizes automation to get rid of complexity. Manage consistent security policies across Cisco ASA, FTD and Meraki MX devices, and lower time allocated to security management tasks by as much as 90%.

Monday, July 29, 2019

Let’s do more good, together

Our goal: Positively impact 1 billion people by 2025


1 billion?! That's a pretty big number to shoot for, but it's something Cisco dedicated to in 2016. And, by the finish of fiscal year 2018, we’ve already had an effect on the cumulative 445 million people worldwide.

“At our core, we will always be about solving problems, connecting people, and pursuing positive outcomes,” Tae Yoo, Senior V . P ., Corporate Matters and CSR, Cisco. Helping people and taking advantage of technology to enhance people’s lives is part of our DNA. It’s who we're.

Global Problem Solver Challenge


Included in our work, we aim to inspire and empower an era of worldwide problem solvers who won't survive - but drive and thrive - within our more and more digital economy. Using the Internet of products (IoT) and digital technologies connecting more devices and knowledge than in the past, plans now be capable of really make a difference more rapidly than in the past. And we’re here to assist.

Our third annual Cisco Global Problem Solver Challenge aims to acknowledge start up business ideas that leverage technology for social impact from student entrepreneurs all over the world. The Task is available to students and up to date alumni from the college or college.



To become qualified, solutions have to incorporate IoT or any other digital technologies. Additionally they require a social, ecological or economic impact (e.g. health, education, ease of access, critical human needs (food, water, disaster response/recovery, safety, etc.).

In the end the submissions were reviewed, $300,000 USD in prize money was spread to assist accelerate the adoption of breakthrough technology, products, and services that drive social, ecological or economic impact.

2019 healthcare winners


From the 10 winning organizations, three directly concentrate on improving health outcomes. Browse the 2019 healthcare winners:

Calla Imaging (second runner up, $25,000)

Cervical cancer affects the lives over 500,000 women yearly, with more than 80% in low-and middle-earnings countries, and 50% of those women die. It's because too little affordable, accessible, and accurate screening. Our vision would be to democratize screening through 1) imaging technology that community health providers or women themselves may use for screening 2) automated algorithms for accurate diagnosis with no expert and three) mHealth application for patient data storage and communication for follow-up.

Saturday, July 27, 2019

Data Center Interconnect: Trends, Transitions and How Cisco’s Intent to Acquire Acacia Is a Game Changer for the Future of DCI Technology

In the current blog, I’ll address the trends in Data Center Interconnect (DCI) and Wide Area Systems (WAN) for Metro and Lengthy Haul distances covering 10km to 10,000 km, and just how the Acacia Communications, Corporation. acquisition might help drive the shifts happening within this space.

Pluggable optics (also known as optical transceivers) are broadly deployed within the data center, campus, enterprise, or company central office, where:

  • Fiber is plentiful: Every router or switch port features its own dedicated fiber. If your new switch or router is added, additional fiber is put into terminate the brand new ports.
  • Distances are short: These distances are usually under 10km. We make use of the term “short reach” of these distances.


Once we think about the features of the atmosphere outdoors the information center - within the DCI and WAN for Metro and Lengthy Haul distances, we have seen different characteristics:

  • Fiber is scarce: Deploying fiber across a town, or across a rustic needs a huge capital expenditure and could take many several weeks to organize and deploy. Within this sense, fiber is recognized as scarce, and also the technical challenge will be to provide just as much capacity as you possibly can onto just one fiber pair - mixing many signals together in creative methods to leverage the entire theoretical capacity from the fiber.  Through the use of technologies like Dense Wave length Division Multiplexing (DWDM), we are able to deliver more than 25 Terabits/s on one fiber pair today (the same as 250 100G signals combined)
  • Distances are lengthy: Typically greater than 40km, but could range to many 1000 km for lengthy haul applications (e.g. New You are able to to La). Challenges in transmitting high bit-rate signals over lengthy distances require coherent transmission technology, instead of “direct detect” technology that's sufficient in a nutshell achieve applications.


The Cisco Global Cloud Index projects those visitors between data centers keeps growing quicker than either visitors to finish users or traffic inside the data center, by 2021, traffic between data centers will take into account almost 14 % of total data center traffic, up from 10 % in the finish of 2016. Our prime development of this segment is a result of the growing prevalence of content distribution systems, the proliferation of cloud services and the necessity to shuttle data between clouds, and also the growing amount of data that should be replicated across data centers.



Bandwidth demands require technologies that offer scalable, reliable and-performance connectivity between data centers. This is achieved by utilizing DCI technology - a growing industry trend and transition.

The main challenges within this atmosphere are:

  • Boost the capacity around the “existing” fiber infrastructure. This is accomplished typically by growing the part rate of every individual wave length, and/or by growing the amount of wavelengths which may be concurrently transmitted.
  • Drive lower the priceOrlittle bit: This really is typically made by growing the wave length capacity and/or by growing the space that the signal may travel before getting to become regenerated.
  • Automate: OPEX costs generally dwarf CAPEX costs for purchasers. We are able to help drive lower OPEX costs by automating a lot of manual processes, and therefore eliminating causes of human error


The important thing trend that people see within this segment is really a migration from chassis-based methods to pluggables.

Functions which were typically delivered in separate chassis-based solutions will be accessible inside a pluggable form factor. It has potentially significant benefits for network operators when it comes to operational simplicity. With time, with ongoing enhancements in ASICs and optics, we've pointless to think this won’t include cover a broader selection of applications.

A week ago, we announced our intent to get Acacia. Acacia provides a complete portfolio of connectivity solutions that address the entire selection of applications within the DCI and WAN segments for Metro, Regional, Lengthy Haul and Underwater links. Cisco will leverage this portfolio in ongoing to grow its optical systems offering for purchasers who've already deployed DWDM systems. Importantly, from your optics/pluggables perspective, Cisco will drive the transition from chassis-based systems to pluggable DWDM technology for purchasers who wish to simplify operations and lower the complexness of managing multiple layers within the network.

Within my next blog, I’ll address trends within the data center and just how our solutions might help customers manage individuals transitions once we progress to 400G and beyond.

Forward-Searching Statements


This web site contains forward-searching statements which are susceptible to risks, uncertainties along with other factors that may cause actual leads to differ materially from individuals known within the forward-searching statements. All statements apart from statements of historic fact (including statements that contains the language “believes,” “plans,” “anticipates,” “expects,” “estimates” and other alike expressions) are statements that may be considered forward-searching statements, while not all forward-searching statements contain these identifying words. For instance, statements regarding integration plans and also the expected advantages to Cisco, Acacia, as well as their particular customers from finishing the purchase are forward-searching statements. Risks, uncertainties and assumptions include individuals described within the joint pr release announcing our suggested purchase of Acacia as well as in Cisco’s SEC reports (including although not restricted to its newest reports on Form 10-Q and Form 10-K filed using the SEC on May 21, 2019 and September 6, 2018, correspondingly). These documents can be found totally free in the SEC’s website at world wide web.sec.gov or by visiting Cisco’s Investor Relations website at https://investor.cisco.com. If these risks or uncertainties materializes or these assumptions proves incorrect, Cisco’s results could differ materially from the expectations during these statements. Cisco undertakes no obligation to revise or update any forward-searching statement unconditionally.

More Information and How to locate It


Regarding the the suggested acquisition and needed stockholder approval, Acacia will file using the Registration an initial proxy statement along with a definitive proxy statement. The proxy statement is going to be mailed towards the stockholders of Acacia. Acacia’s stockholders are advised to see the proxy statement (including all amendments and supplements) along with other relevant materials once they become available simply because they contains information. Investors may obtain free copies of those documents (when they're available) along with other documents filed using the SEC at its website at https://world wide web.sec.gov. Additionally, investors may obtain free copies from the documents filed using the SEC by Acacia by visiting Acacia’s Investor Relations page on its corporate website at http://ir.acacia-corporation.com or by contacting Acacia Investor Relations at (212) 871-3927.

Acacia and it is executive officials and company directors might be considered to become participants within the solicitation of proxies from Acacia’s stockholders with regards to the acquisition. Details about Acacia’s company directors and executive officials, including their possession of Acacia securities, is placed forth within the proxy statement for Acacia’s 2019 Annual Meeting of Stockholders, that was filed using the SEC on April 3, 2019, Form 8-K filed using the SEC on June 3, 2019, and Acacia’s other filings using the SEC. Investors may obtain more in depth specifics of the indirect and direct interests of Acacia and it is particular executive officials and company directors within the acquisition by studying the preliminary and definitive proxy statements concerning the transaction, which is filed using the SEC.

Additionally, Cisco and it is executive officials and company directors might be considered to possess took part in the solicitation of proxies from Acacia’s stockholders in support of your application from the transaction. Information concerning Cisco’s company directors and executive officials is placed forth in Cisco’s proxy statement because of its 2018 Annual Meeting of Shareholders, that was filed using the SEC on October 24, 2018, annual set of Form 10-K filed using the SEC on September 6, 2018, Form 8-K filed using the SEC on May 22, 2019, and Cisco’s other filings using the SEC.

Thursday, July 25, 2019

Keeping Healthcare Humming

In excess of 175 years, health provider Die Zieglerschen has had proper care of people across Germany. Today, they run facilities in 60 places-from health clinics to senior centers to kindergartens. Each using their purchased it needs.

That’s lots of systems to maintain. Many people who depend on their own apps to provide timely care. As well as the key data they store about patients, treatments, and all things in between. It had been all being a heavy load for his or her 13-person IT team to deal with.

So to maintain the interest rate of healthcare, the company required to make their systems improve your speed. They have to unveil new solutions from one place. And they have to store lots of sensitive medical data efficiently and securely.

That is why Die Zieglerschen switched to FlashStack. It combines Cisco UCS servers and systems with Pure Storage’s all-flash storage. This allows them store apps and huge amounts of data virtually. With efficient storage components which use significantly less power, cooling, and space inside a data center.

Following a “flawless” FlashStack rollout, their data and apps work fantastic. Around the front finish, patients and caregivers can sign in and employ apps effortlessly. Behind the curtain, It will take lightning-quick snapshots of the data every fifteen minutes. And they’ve reduced lower from the full storage rack to simply 3 units. It’s made everything fast, easy, and straightforward.

Because they place it, “Working with Pure Storage is pure fun.” Because it’s much less work. Their IT team spends 90% a shorter period managing their data and apps. Which leaves them additional time for what’s most significant-picking out new ways to help individuals.

Between taking care of systems and taking care of people, there is a bridge.

Tuesday, July 23, 2019

Security Talk: A Bedtime Story for my Son

13 years back, I had been a large-eyed kid attempting to make it within the big city. I began my career in expertise - meaning I had been a sales guy who focused on placing network engineers into full-time permanent positions within the Washington Electricity Metro Area.

This is where When i first met Cisco when i helped to place CCNA, CCNP, CCIE types into professional roles - and that i loved it! Much more, I loved Cisco and all sorts of they'd to provide their workers. Because of this, it grew to become an aspiration of mine to at some point work with them as well.

Eight years later, that dream will come true when i would formally be a Cisco worker and virtually every day since I’ve been proud to state which i #LoveWhereYouWork.

In the event that kid from 13 years back often see me now, he’d be floored when i support among the fastest moving, most heavily committed to, hottest, and various security portfolios on the planet - Cisco’s Security Business Group.



We employ the brightest and finest security professionals on the planet who focus on state of the art items like AMP, our Advance Adware and spyware Protection SaaS based offering, our Network Security Team - that is a dominant pressure within the firewall space, along with other SaaS based items like Umbrella - which utilizes the internet’s infrastructure to bar a malicious destination before an association is ever established.

These teams aren’t just driving the safety landscape - they’re shaping the whole industry, and I’m excited to become along for that ride.

What’s each day within the existence seem like for me personally? It might not be ALL security, Constantly - among the finest advantages of working at Cisco is they realize you’re an individual too.

4:30PM is definitely the good thing of my day - the daily daycare get - like a rambunctious 3-year-old boy runs over and throws me in to the largest bear hug and plants a level bigger hug on my small oral cavity. I’m glad I never need to miss obtaining my boy from soccer practice, and it is all because of the incredible culture Cisco Security has drilled into its employees - family first.

Flexible hrs. Telecommuting options. The opportunity to work everywhere - which, for me personally, means from home office on snow days particularly - all are due to how Cisco trusts its employees to complete the job, and just how our technologies have enabled us not just to maintain our work, but our way of life - and also the people who matter most, too. Due to Cisco, Irrrve never miss a minute of my son’s existence.

Which reminds me, as our mid-day progresses, we roll into my SECOND favorite area of the day - Security Talk!

The thing is, as i could be the Talent Acquisition Lead for America’s Engineering at Cisco Security - I'm additionally a father attempting to educate his boy concerning the hottest technical industry. I would like him to understand how awesome my job is within having the ability to support our security teams, and just how I’m getting an immediate effect on making the planet a much better - safer Place. Because in the finish during the day, that’s our mission at Cisco Security - we’re here to safeguard.

Security Talk happens when evening hits within our household, somewhat before my son’s bed time - part data here we are at me, and a kind of homeschooling and bedtime story for him because he will get that helped me to “click some buttons”, break lower some stand out spread sheets, and appear through some security hiring reports.

As names appear I simply tell him, “There’s one - this is among daddy’s work buddies who's assisting to safeguard us from Adware and spyware.” He’s three, maybe he doesn’t know everything yet about Adware and spyware, but that is why Security Talk is really important.

I simply tell him how this friend oversees our Security Research Team to incorporate areas like Adware and spyware Research, and just how Adware and spyware is one thing that hurts people - it’s bad. He nods his mind, when i simply tell him don't worry though since i assistance to fight unhealthy guys by recruiting the great people around the globe (the moral online hackers around the globe, for a moment) to become daddy’s buddies at Talos, who helped to educate me about security and why it’s important.

Our buddies at Talos exist to complete one factor - keep mother, father and all sorts of us and buddies safe. They're there to safeguard us.

We may have heard Talos among the largest commercial threat intelligence teams on the planet. They’re those given the job of maintaining your world safe by disrupting the malicious activity and reporting in on new and emerging threats to the product teams and greater security community.

My boy knows Talos to become a super hero, and the father is among individuals superheroes too.

In the end, that’s who we're at Cisco Security - we've got the technology superheroes from the twenty-first century.

We’re the biggest security firm on the planet. We’re one team with one dream. We’re the defenders from the online innocent, thwarting unhealthy guys who wish to impose harm upon us.

Every single day at Cisco Security is definitely an adventure, and each day I'm grateful to become here assisting to fight the great fight. Much more so, I'm glad which i reach have my loved ones together with me about this adventure - which, when i tuck him into bed, they know that Talos, Cisco Security, and father will be there to safeguard him.

Sunday, July 21, 2019

Secure Your Applications and Your Seat at the Yankees Game

Application security is top-of-mind its our customers. Information mill expanding towards the cloud, along with the proliferation of Take The Own Device (BYOD) being able to access applications, the atmosphere outdoors from the data center has become harder to secure. That's the reason it's imperative our security defenses move nearer to the applying.

Top worldwide security agencies like the NSA and also the Australian Signals Directorate list network segmentation among the best tools to avoid your organization from standing on the leading page from the news for that wrong reasons. And industry research firm Gartner names application segmentation among the foundational support beams of effective cloud workload protection.

Regardless of whether you refer to it as micro-segmentation, application segmentation, cloud workload protection, or Zero Trust, restricting how a credit card applicatoin can communicate around the network is really a security imperative.

But I've got a firewall


Although we’ve been speaking about segmentation in excess of ten years, until this time firewalls happen to be a powerful first type of defense. After conversations with a large number of our customers, we notice that firewalls are now able to only participate the answer. The greater users, devices, applications, and knowledge you’re managing, the greater difficult securing your network becomes. Firewalls are needed, but they’re not enough any longer. With micro-segmentation enabling a zero-trust model, users experience holistic workload protection for multicloud data centers. This method enables you to definitely identify security occurrences faster, contain lateral movement, and lower their attack surface.



Ok, let’s go ahead and take Yankees for instance


Imagine seeing a Yankees baseball game in which you have great seats directly behind the dish. Like every ball game, we’re accustomed to dealing with security in the stadium entrance where they check our tickets, walk us via a metal detector, and inspect our bags. This is effective like a lower layer of security, what when the only place where they look at your tickets reaches the doorway? When you are inside, there's not a way to enforce regardless of whether you or another person sits inside your seat. Do you consider you’ll get the seat? Most likely, however the only reason this works happens because we trust that everybody visiting the game plays fair. Let's say it’s a championship game and since there's no security inside, there aren’t any effects if a person takes your seat? We’re beginning to believe rather less.

Now, suppose your seat in the game is really a database of social security figures or charge card credentials. This is the way plenty of customers build data centers today. The following-generation firewall applies security in the entrance, but when inside, they are able to go anywhere.

Let’s return to that very same championship game. We still extensive security in the entrance. However this time, when you are inside everybody is personally escorted for their correct seats. It is exactly what Zero Trust micro-segmentation appears like. To apply this degree of security, you'll need not only the escort. You have to ratify your identity, that is basically a validated ticket together with your name (what you are) as well as your seat (where you stand permitted to visit).

Trying to deliver micro-segmentation with simply an application-defined firewall is much like hiring a large number of security escorts but failing to remember to print seat figures on all the tickets. It just addresses area of the problem.

Cisco is revolutionizing micro-segmentation and workload protection


Cisco Tetration delivers true application segmentation security. Together with enforcing segmentation, it will help customers automate and operationalize segmentation, delivering risk management and tremendously elevated time-to-value.

Tetration was constructed from the floor-as much as re-think how customers implement micro-segmentation, breaking lower barriers by automating the segmentation process. Specific Tetration details include:

  • Automatic rule discovery leveraging the strength of big data and machine learning
  • Simulation of micro-segmentation rules just before (optionally) enforcing them
  • Fully-integrated enforcement abilities in almost any cloud With no major infrastructure changes
  • Day two troubleshooting and lifecycle management.


But segmentation is simply the initial step. Tetration is distinctively made to safeguard workloads by understanding vulnerabilities, integrating threat intelligence, and analyzing behavior to recognize zero-day attacks like Spectre and Meltdown.

Additionally, Tetration dramatically cuts down on the time that it takes for the people to achieve elevated application security. It applies segmentation with an amount of detail that can make applications invisible to attackers, as well as an attacker can’t hack the things they can’t see.

With last year’s launch of Tetration SaaS, it’s now available to every customer. It’s time for you to think larger than just implementing a “software-defined firewall” and start securing applications with Cisco Tetration.

Friday, July 19, 2019

Reduce Cost By Integrating with Microsoft IT Tools and Enjoy Webex Native Security Capabilities

Simplify Deployment and lower Total Price Of Possession (TCO)


IT administration can frequently be complex and challenging. To be able to deploy, operate and assure mission critical collaboration services, IT admins have to integrate disparate solution components within an frequently complex atmosphere. And simultaneously there's often a have to reduce TCO while safely moving out new releases which are centered on improving worker productivity.

At Cisco, we're constantly purchasing abilities and partnerships to make sure that Webex suits your overall IT infrastructure and tools inside a vendor neutral way, while adding the defining collaboration security and compliance abilities you have arrived at expect of Cisco. Microsoft 'office' productivity suite services like Word, Stand out, PowerPoint, OneDrive, Sharepoint Online are well-liked by our large enterprise customers. And thus Cisco Webex has tight integrations using the applications that the employees use - so we heard great feedback whenever we lately announced the combination of Webex Teams with Microsoft SharePoint and OneDrive.

We're using the same building bridges technique to administration, and therefore are constantly expanding our IT and compliance partner ecosystem. Which means that you've greater versatility and selection in the manner that you simply deliver collaboration services inside your organizations. Our customers who've Microsoft 'office' suite deployments frequently request interoperability options between your Webex collaboration as well as their Microsoft productivity suite Admin tools, for the greatest collaboration and productivity tools together.

Frequent demands are:

  • Automated user provisioning and deprovisioning by integrating with Azure AD Identity Store for improved security minimizing TCO,
  • So that you can apply common org-wide authentication policies through Azure AD SSO for consistent consumer experience and elevated control
  • For the similar Loss Of Data Prevention (DLP) and CASB policies they have for Exchange, OneDrive and SharePoint Online to operate seamlessly with Webex Teams for lower TCO and enterprise compliance


Because the mind from the security and enterprise product for that Webex Platform, I'm hyper-centered on delivering unmatched security, simpler manageability and interoperability to enhance the lives of collaboration managers.



Zero-Touch Provisioning


Webex has integrated with Azure AD via industry standard SCIM protocol to simplify user provisioning, and supports standards based SAML Single Sign-On (SSO) with Azure AD. There's you don't need to deploy and run a connector, and identities within the MSFT and Webex clouds are safely stored synchronized. A brand new user defined in Azure AD is instantly provisioned in Webex, with service entitlements according to an admin-defined Auto License Assignment template. So when a person leaves the organization, Webex will instantly deprovision that user, logout their active sessions as well as wipe cached content using their client on all devices.

Secure Exterior Collaboration and knowledge Loss Prevention


I'm also very happy to announce that Microsoft and Cisco have partnered to make sure that managers may use the policies defined in Microsoft Cloud Application Security (MCAS) to safeguard Exchange, OneDrive and SharePoint Online for Webex Teams. MCAS integrates with Webex Teams through the Webex Occasions API to identify policy violations, and may take removal actions, for instance to delete a note, inform the consumer or admin, or remove a person from the space. To finish it off, there's no additional MCAS license fee needed with this integration. IT and Security admins can see policy violations and removal actions in one location within the MCAS console leading to lower TCO.

Collaboration admins love Webex Teams’ unique capacity to permit secure collaboration with full visibility and control of content generated by their workers in spaces of others. The MCAS integration fully supports this capacity, while other vendors cannot support this degree of visibility and control because of architectural limitations.

Reassurance Through State Of The Art Webex Teams Security


Webex Teams Finish to Finish file encryption is constantly on the provide unparalleled degree of data protection and privacy against Man-in-the-middle attacks. As well as an choice to host keys solely inside your data centers provides you with the greatest degree of control.

Files could possibly be the greatest supply of loss of data. Webex gives managers full control of file discussing. For instance,

  • you are able to disable file share on some clients or all clients.
  • you can decide to just use your approved EFSS like OneDrive, SharePoint On the internet and turn-off storage of use files in Webex cloudyou can define specific approved EFSS domains or Azure tenant IDs for example cisco.onedrive.com and disable shadow IT or personal domains.


And Webex has generated-in MAM abilities like PIN lock, the opportunity to pressure logout, remote wipe of cached content, and also the ability to help you secure content even on unmanaged devices.

Monday, May 13, 2019

Malicious Forces Cracking your SD-WAN Concrete - Reinforce your Network with Cisco SD-WAN Security

Security must be deep-rooted into every software-defined WAN (SD-WAN) solution rather than bolted on as an afterthought, much like the process of planting reinforcement steel in concrete.

Concrete has been used in construction for more than a thousand years. It has excellent compressive strength which allows it to endure heavy weights but little to no strength in tension forces, which are concrete’s tolerance against pressing and stretching. Most of the current SD-WAN solutions in the market, like concrete, have some notable attributes. They can provide WAN optimization, Zero-touch deployment, centralized management, basic segmentations, and perhaps limited security functionalities like stateful firewalling and VPN. But are they also able to protect your branch network against all internal and external threats in Direct Internet Access (DIA)?

Thousands of new complex cybersecurity threats emerge every day. Similar to concrete tension forces, these threats will eventually crack and break your SD-WAN branch network. These malicious forces are more potent when connecting your branch directly to the cloud using a common internet highway bridge.

SD-WAN Security: Built-in or Bolted-on?


In almost every area of life, compared with a “built-in” option, it’s hard to imagine someone would choose a “bolted-on” as their first resort. Security is not so different. Yet many enterprises are using external security appliances to secure their directly connected SD-WAN branches to the cloud. This bolted-on security norm comes as no surprise. In the current market, there are simply not enough SD-WAN solutions with a substantial level of integrated security.

The process of bolting on legacy security tools often creates unnecessary complexity and overhead because these standalone products were never truly designed for an SD-WAN deployment. These bolted-on tools do not share the WAN tenets and have a difficult time adapting to today’s agile and scalable SD-WAN solutions.



Having distinct security and networking domains at each branch not only increases the total cost of ownership but also complicates deployment, monitoring, and manageability.  A simple policy update, for example, necessitates jockeying back and forth between two different monitoring dashboards. Managing integrated security and networking controls from a single console saves time and money and makes for an overall more efficient and effective system, just as using reinforced steel bars speeds up construction.

Cisco SD-WAN security reinforcing your WAN Network


Unlike other SD-WAN vendors’ solutions in which customers have to compromise on security, application experience or advanced routing, Cisco offers an integrated industry-leading SD-WAN with best-in-class security solution. This “no compromise” solution connects any device and any user to any cloud and delivers consistent threat protection from branch locations to the cloud edge.

With Cisco SD-WAN, multiple layers of enterprise-level security capabilities – such as application-aware firewall, intrusion prevention, URL filtering, file reputation, and simplified cloud security – can be deployed and managed through single interface dashboard, at scale.

Gaining additional protection with Cisco Umbrella, a secure internet gateway, is as simple as checking a box within the Cisco SD-WAN unified management console. Umbrella protects users across your Cisco SD-WAN from threats such as malware, ransomware, and C2 callbacks with no added latency

These integrated security capabilities are powered by Cisco Talos security engine, one of the largest threat-intelligence organizations in the world, to block sources with suspicious behaviors before they proliferate across the network.

To meet today’s highly flexible and scalable demands of an SD-WAN solution, a built-in security approach needs to be part of any SD-WAN architectural design to better detect and prevent evolving threats, while simplifying management and improving performance.

Friday, March 15, 2019

Drones give journalists a new way to report news:



Technology allows journalists to tell stories in ways they've never done before.

The use of drones by journalists is taking off, as more news organizations realize the value of an alternative data-gathering tool. But adoption is slow as reporters learn to navigate the regulatory complexities associated with the practice. Matt Waite, a professor in the College of Journalism and Mass Communications at the University of Nebraska-Lincoln, first recognized the potential and value of drones while at a digital mapping conference several years ago. There, he came across a company that was building an aircraft with a camera on the bottom and a computer on board that was shooting pictures on the ground. "I thought, ‘Wow, we could do mapping of hurricane damage on the spot, or in a matter of hours,' " recalls Waite. But the aircrafts costs $65,000 each and are illegal in the United States. There was no way to manually fly it as it was all automated. "I was disappointed but I went back to my new faculty office and saw the FAA was looking to change regulations about UAVs," he said. "I went to my deal and told him I thought we should start a drone lab and get out ahead of this because I knew there would be a lot of ethical and legal issues involved in this that was beyond a lot of journalism. "So in November 2011, the university's drone lab was born. After receiving some grant funding in 2012, the school did its first story partnering with another lab on campus covering the area's worst drought since the Depression by flying over a dry river bed with a drone.


Eight months later, the school received a cease and desist letter from the FAA. After at least a year of going back and forth with the agency, it was determined that drones could be flown but only by a licensed manned aircraft pilot, and only in designated areas. So Waite became a licensed pilot. The process made him realize that the greatest impediment to journalists using drones all along had been regulatory. So to help others navigate the complicated process, Waite teamed up with Al Tompkins, the Poynter Institute's senior faculty for broadcasting and online to hold the first Drone Boot Camp, or drone journalism school, last summer.. 62 journalists attended with the intention of learning how to take an aeronautical knowledge test. Rules had changed so that one no longer had to be a licensed pilot to fly a drone. "One reason we wanted to conduct these workshops is because we were seeing one-day training workshops that are too expensive for journalists. We want to put this knowledge within reach of every newsroom regardless of size," said Tompkins. "Plus, journalists have unique training needs that are different from others who want to use drones in their work. Journalists will need specialized training around privacy concerns that drones raise in some people's minds."

Here You Can Get Cisco Certification Exam Dumps: