Cisco continues its network-based security strategy by moving to acquire Observable Networks

Over the past few years Cisco has changed the face of its security business. What was once a struggling concern is now the fastest-growing part of Cisco. How did the company do this? Part of the rebirth of Cisco security can be traced to a change in focus, away from point products to a more data-driven model. Big data, analytics and machine learning have been hot topics in IT, and Cisco has gotten religion in this area and applied it masterfully to its security business.

Today, Cisco added to that when it announced its intent to acquire privately held Observable Networks. The St. Louis-based company provides dynamic network behavior monitoring to help security teams find anomalies that could indicate a breach. The product captures data and analyzes it to gain situational awareness of all users, devices and traffic, not only on a company’s network, but also out to the cloud, with support for both Amazon Web Services and Microsoft Azure.

To read this article in full or to leave a comment, please click here

Continue reading Cisco continues its network-based security strategy by moving to acquire Observable Networks

Posted in Uncategorized

Cisco continues its network-based security strategy by moving to acquire Observable Networks

Over the past few years Cisco has changed the face of its security business. What was once a struggling concern is now the fastest-growing part of Cisco. How did the company do this? Part of the rebirth of Cisco security can be traced to a change in focus, away from point products to a more data-driven model. Big data, analytics and machine learning have been hot topics in IT, and Cisco has gotten religion in this area and applied it masterfully to its security business.

Today, Cisco added to that when it announced its intent to acquire privately held Observable Networks. The St. Louis-based company provides dynamic network behavior monitoring to help security teams find anomalies that could indicate a breach. The product captures data and analyzes it to gain situational awareness of all users, devices and traffic, not only on a company’s network, but also out to the cloud, with support for both Amazon Web Services and Microsoft Azure.

To read this article in full or to leave a comment, please click here

Continue reading Cisco continues its network-based security strategy by moving to acquire Observable Networks

Posted in Uncategorized

Digital Transformation Requires a Security Rethink

Over the past few years digital transformation has become a hot topic with both business and IT leaders.  Organizations that embrace digitization and use the concepts to create new processes and products have the opportunity to become leaders in their industries.  Those that do not will struggle to survive and possibly go out of business […]

The post Digital Transformation Requires a Security Rethink appeared first on Radware Blog.

Continue reading Digital Transformation Requires a Security Rethink

Cisco announces cornucopia of product updates at Enterprise Connect

The industry’s largest collaboration show, Enterprise Connect, gets underway this week in Orlando, Florida. The show has become the place for vendors to show off the latest and greatest, and the week started off with Cisco announcing some new products and updates to existing ones. 

Cisco’s collaboration business has been on quite a roll of late, as it has released a number of new solutions, including the game-changing Spark Board, which was unveiled earlier this year. 

To read this article in full or to leave a comment, please click here

Continue reading Cisco announces cornucopia of product updates at Enterprise Connect

Posted in Uncategorized

Fortinet CISO on securing critical infrastructure: ‘We can no longer bring a knife to a gunfight’

Earlier this year Fortinet hired its first chief information security officer (CISO). The timing makes sense, as the company has grown into a leading security vendor with an integrated, security fabric vision that few competitors can match.

As Fortinet continues to expand its presence in the federal and critical infrastructure markets, CISO Philip Quade brings the credentials and background needed to help lead the strategy. Prior to joining Fortinet, Quade was the NSA director’s special assistant for cyber and chief of the NSA Cyber Task Force. Before that, he was chief operating officer of the Information Assurance Directorate at the NSA.

I recently talked with Quade regarding his new role and the challenges the United States and businesses in general face with respect to security.

To read this article in full or to leave a comment, please click here

Continue reading Fortinet CISO on securing critical infrastructure: ‘We can no longer bring a knife to a gunfight’

Posted in Uncategorized

Complete security deception includes detection and incident response

Deception tools have been growing in popularity over the past several years, but customers need to ensure they are using the technology to its fullest potential. 

The concept behind deception is fairly simple to understand: Security teams deploy a fake target that is monitored closely, which hackers will attack. Once the target is breached, the security team is alerted to the threat. 

In my experience, the use of deception technology is relatively low compared to the amount of time, energy and money invested in traditional intrusion prevention systems. Part of the challenge of deception is that maintaining things such as decoys, breadcrumbs and honeypots can be difficult in environments that are always changing. However, networks are becoming more agile through the use of software, making deception technology more agile and easier to use. 

To read this article in full or to leave a comment, please click here

Continue reading Complete security deception includes detection and incident response

Posted in Uncategorized

Cisco unveils Hierarchy of Needs for the digital enterprise

The European edition of Cisco Live took place this week in Berlin, which is a fitting location given the amount of innovation happening in that city right now. If you ever find yourself in Berlin, be sure to check out Cisco’s Open Berlin innovation center where inventive start-ups are building and showcasing solutions that run on Cisco technology.

Innovation and digital transformation are linked together like Kirk and Spock. You can’t have one without the other. At this week’s event, Ruba Borno, Cisco vice president of growth initiatives and chief of staff for the office of the CEO, gave her first-ever keynote to a Cisco Live audience. Not surprisingly, she focused on digital transformation. However, unlike many keynotes I have seen, Borno didn’t just talk about digitization at a high level. Instead she was more prescriptive and gave the audience a guide on how to proceed with making the shift to a digital enterprise. 

To read this article in full or to leave a comment, please click here

Continue reading Cisco unveils Hierarchy of Needs for the digital enterprise

Posted in Uncategorized

Cisco unveils Hierarchy of Needs for the digital enterprise

The European edition of Cisco Live took place this week in Berlin, which is a fitting location given the amount of innovation happening in that city right now. If you ever find yourself in Berlin, be sure to check out Cisco’s Open Berlin innovation center where inventive start-ups are building and showcasing solutions that run on Cisco technology.

Innovation and digital transformation are linked together like Kirk and Spock. You can’t have one without the other. At this week’s event, Ruba Borno, Cisco vice president of growth initiatives and chief of staff for the office of the CEO, gave her first-ever keynote to a Cisco Live audience. Not surprisingly, she focused on digital transformation. However, unlike many keynotes I have seen, Borno didn’t just talk about digitization at a high level. Instead she was more prescriptive and gave the audience a guide on how to proceed with making the shift to a digital enterprise. 

To read this article in full or to leave a comment, please click here

Continue reading Cisco unveils Hierarchy of Needs for the digital enterprise

Posted in Uncategorized

Avaya Surge protects the Internet of Things

The Internet of Things (IoT) is hitting a tipping point. While there has been a fair amount of IoT chatter and hype over the past few years, deployments have been limited to the traditional machine to machine (M2M) verticals such as oil and gas, mining and manufacturing. Over the past couple of years, though, more verticals have been looking to connect more non-traditional IoT devices.

The reason I think we’re at this tipping point is because businesses aren’t referring to these deployments as “IoT” but rather it’s becoming normal operations to connect more and more devices. 

+ Also on Network World: The Internet of Things security threat +

Healthcare has rapidly been connecting patient devices, retailers are making point-of-sale systems “smart,” hotels are looking to improve the guest experience, and sports and entertainment venues are connecting more devices. While these verticals may seem different, the commonality of IoT initiatives is that when everything is connected, you can change the way the business interacts with customers, students, patients, patrons, employees or other constituents that interact with the organization. 

To read this article in full or to leave a comment, please click here

Continue reading Avaya Surge protects the Internet of Things

Posted in Uncategorized

Cisco unveils Tetration 2.0, focuses on application security

The middle of last year, Cisco held an event in New York to release its newest product, Tetration. The product moved Cisco into the analytics market, with the information being used to help customers better understand application performance and improve data center security. 

This week, Cisco announced the next version of Tetration Analytics, which is focused at providing security at the application layer. Cisco also released some new deployment options to make it easier for customers to get started with Tetration. 

To read this article in full or to leave a comment, please click here

Continue reading Cisco unveils Tetration 2.0, focuses on application security

Posted in Uncategorized