Threat Trends: DNS Security, Part 2 – Cisco Blogs

Threat Trends: DNS Security, Part 2 – Cisco Blogs

Part 2: Industry trends In our Threat Trends blog series, we attempt to provide insight into the prevalent trends on the threat landscape. Our goal in giving you the latest info on these trends is that you’ll be better prepared to allocate security resources to where they’re needed most. Knowing the larger trends can help in this pursuit, particularly when it comes to the most common threat types. This is what we covered in part…

Read More

Five ways we’re improving telework with SD-WAN and telemetry – Cisco Blogs

Five ways we’re improving telework with SD-WAN and telemetry – Cisco Blogs

Bad dream for an IT engineer? Try this: an executive working from home gets booted off an all-hands video meeting. Then it happens again. And again. That happened to me a couple of months ago. Fortunately, when I received the call, I could see immediately that the problem lay with the executive’s ISP, not our network. As a result, my team quickly resolved the problem and saved hours of troubleshooting time. And I slept better. Better visibility is one of several ways…

Read More

Introducing the Cisco DNA Traffic Telemetry Appliance

Introducing the Cisco DNA Traffic Telemetry Appliance

Add-ons extend the latest technology to legacy systems, like how my old TV turned smart overnight with an additional streaming player. It is even better when the supplements work in cohesion with the primary products to deliver a seamless experience.  Imagine if you could utilize the same remote to operate your TV and streaming player. The Cisco Catalyst 9000 series wired and wireless devices enable enterprises to unlock newer network infrastructure possibilities. For instance, these platforms…

Read More

Webex Is Highest-Ranked Video Conferencing Solution on G2’s Best Remote Tools 2021 List

Webex Is Highest-Ranked Video Conferencing Solution on G2’s Best Remote Tools 2021 List

Best in Class Once Again On the heels of receiving Trustradius’ “Best of” 2021 Awards, Webex has brought home more “Best of” awards. G2 has announced their 2nd annual Best Software lists, and we are excited to be the highest-ranked conferencing solution on the Top Remote Tools list. Webex also ranked as the top conferencing solution on the Best Enterprise Products list. We further retained our positioning as the highest-ranked solution in our category, an…

Read More

What’s on your network?

What’s on your network?

If you’d like to know what systems and devices are attached to your local network—whether out of security concerns or simple curiosity, Linux has some really great commands for providing answers. In this post, we’ll probe a small network and see how devices can be identified. nmap The first tool we’ll use is nmap, which stands for Network Mapper, an open source tool for exploring networks and doing some serious security auditing. It was designed…

Read More

What’s on your Linux network?

What’s on your network?

If you’d like to know what systems and devices are attached to your local network—whether out of security concerns or simple curiosity, Linux has some really great commands for providing answers. In this post, we’ll probe a small network and see how devices can be identified. nmap The first tool we’ll use is nmap, which stands for Network Mapper, an open source tool for exploring networks and doing some serious security auditing. It was designed…

Read More

Effective Zero Trust Requires a New Definition of Data Protection

Effective Zero Trust Requires a New Definition of Data Protection

Data is the ultimate asset of modern business and the foundation of digital transformation. It is the currency that funds innovation and growth. Data must be protected with the utmost rigor, but it must also flow effortlessly to where it can deliver the greatest benefits. In an era where the cloud rules infrastructure, traditional network security is no longer useful.  The current construct for data protection is outmoded and in urgent need of an update….

Read More

Meet the Users Who Use User Defined Network – Cisco Blogs

Meet the Users Who Use User Defined Network – Cisco Blogs

All rights reserved to Sandra Cifo The last year has been anything but business as usual for most colleges and universities. But network advances are still happening and recently a pair of Cisco customers talked about one of these new Cisco innovations. During a recent Educause webinar, Cisco Architect Stephen Orr moderated a discussion of Cisco User Defined Network (UDN) between Ken Boynton Communications Network Analyst, Principal at the University of Arizona and Rich Fraboni,…

Read More

Straight from the source: 3 ways customers are improving security with Secure Network Analytics

Straight from the source: 3 ways customers are improving security with Secure Network Analytics

We know all too well that security can be a grind and that modern threats are and will continue to become more and more stealthy and sophisticated. A few years ago, the typical security practitioner’s plight was often described as an anxiety-inducing and exhausting existence that involved sifting through an endless barrage of alerts and reacting whenever known threats had penetrated their organization. Unfortunately, though – as with all arms races – modern cyber weapons and…

Read More

Discover Hidden Secrets of Operational Excellence – Cisco Blogs

Discover Hidden Secrets of Operational Excellence – Cisco Blogs

There is a proven link between operational readiness and business performance.  From a partner and distributor perspective, being operationally ready is about identifying the right mix of efficiencies for people, processes and tools to transact business at scale.  The value to you; operational efficiencies to keep and grow your competitive edge. One of the many things I love about my team is their desire to not only move along with the latest trends, but also…

Read More
1 1,052 1,053 1,054 1,055 1,056 1,144