Avoid sinkholes with F5 Simulators: Evolution of the F5 – Cisco ACI joint solution

Avoid sinkholes with F5 Simulators: Evolution of the F5 – Cisco ACI joint solution

This blog is a joint collaboration between Ravi Balakrishnan (Cisco) and Patrick Campbell (F5)   Sinkholes A lot of people struggle with the best way to demo a product, especially in our world of digital marketing. This is true whether you’re a prospective user or represent your company’s produced product or service.  After the investment in creating an offering which (we hope!!) addressed a need, a gap or provides differentiated uses, if there’s isn’t awareness…

Read More

IBM and Cisco Sessions at IBM Think 2021 – Cisco Blogs

IBM and Cisco Sessions at IBM Think 2021 – Cisco Blogs

IBM and Cisco have been global strategic partners, working together for the benefit of our mutual customers, for more than 20 years. Together, our objective is to help our customers reduce risk and accelerate their journeys to real-world value in several areas, including hybrid cloud, security, Internet of Things, and collaboration (Figure 1). Figure 1. IBM and Cisco areas of partnership Today, we have over 20,000 mutual customers in 75 countries, representing more than 20…

Read More

Join us for an episode of The Gateway Triangle podcast: Featuring Pierce Vasale – Cisco Blogs

Join us for an episode of The Gateway Triangle podcast: Featuring Pierce Vasale – Cisco Blogs

The Gateway Triangle is a new podcast series featured on The Global Gateway, Cisco’s customer advocacy community with thousands of advocates worldwide! I host the podcast along with my colleague, Katie Meerstein. The podcast features team members from Cisco’s Global Advocacy organization, as well as our valued customer advocates who make The Gateway possible. We love to keep it laid back while we discuss tech, advocacy, and life in general. We’re back with another episode…

Read More

How Cisco Never Left Me – Cisco Blogs

How Cisco Never Left Me – Cisco Blogs

This post was written by Jonathan Austin a Cisco Hardware Engineering Intern. I never would have thought that a company could manifest its culture in so many areas of my life, from my career, to my personal life, and to where I hope to see myself one day. Let’s rewind. In my 3rd year at San José State University, I was still trying to figure out what career building was and wondering if Electrical Engineering…

Read More

The Modern Security Operation Center – Cisco Blogs

The Modern Security Operation Center – Cisco Blogs

Every organization regardless of size, budget or area of focus should have some form of a security operation center (SOC). When I use the term “Security Operations Center”, many people imagine a dedicated team with expensive tools and a room full of monitors. That image can be a SOC, but it is not always the case. A SOC can just be one person or multiple groups of people spread across the globe. A SOC can…

Read More

Viewing enabled and running services on Linux with systemctl

Viewing enabled and running services on Linux with systemctl

A vast majority of Linux systems these days are using systemd – a suite of programs aimed at managing and interconnecting different parts of the system. Systemd started replacing the init process back in 2014 and is now the first process that starts when most Linux systems boot. To get a quick peek, you can run a command like this, which verifies that process 1 is indeed systemd. On this system, two additional systemd processes are currently also…

Read More

Cisco preps now for the hybrid workforce

Cisco preps now for the hybrid workforce

Work-from employees will no longer be treated as a second-class citizen, which means they will get best-in-class technology including SD-WAN appliances, cellular backup alternatives, zero trust security support and maybe even battery backup. That’s at least part of the plan for hybrid workers now and moving forward, said Cisco’s Todd Nightingale, executive vice president and general manager of the company’s Enterprise Networking & Cloud business. “The ‘return-to-office’ concept is a myth–it’s a world we have…

Read More

Cisco Responds to Biden Administration Critical Infrastructure Cybersecurity Memorandum – Cisco Blogs

Cisco Responds to Biden Administration Critical Infrastructure Cybersecurity Memorandum – Cisco Blogs

Today, Cisco’s Eric Wenger, Senior Director of Technology Policy, Global Government Affairs, responds to the Biden Administration National Security Memorandum on Improving Cybersecurity for Critical Infrastructure Control Systems: “Cisco welcomes the continued attention that the federal government is applying to secure critical infrastructure (CI). We applaud the leadership CISA and NIST will take developing common cybersecurity performance goals across critical sectors to confront common threats, like ransomware. Both agencies have a strong track record of collaboration with…

Read More

Distributed IT – Juggling More Balls with the Same Number of Hands – Cisco Blogs

Distributed IT – Juggling More Balls with the Same Number of Hands – Cisco Blogs

Learning to Juggle The term “data center” has become somewhat of a misnomer, and that’s because data is no longer centered. As businesses have become more distributed, so too have the technology resources that support and enable them. With infrastructure and applications now dispersed among data center, cloud, branch office, and edge environments, many organizations are reaching an inflection point. One where the business’ appetite and need for technology enablement has expanded beyond the IT team’s…

Read More

What is OPC-UA—and how does it manage security? – Cisco Blogs

What is OPC-UA—and how does it manage security? – Cisco Blogs

Introduced in 1994, Open Platform Communications (OPC) is an interoperability standard for industrial control system components like programmable logic controllers (PLCs), human-machine interfaces, and supervisory software. Using OPC, components from different vendors can reliably exchange data to control an industrial process. Classic OPC was released in an era when security was not a concern for OT systems. Industrial networks were isolated and perceived as secure because they used proprietary protocols. “Security by obscurity” doesn’t work…

Read More
1 1,196 1,197 1,198 1,199 1,200 1,379