Digital transformation for Federal agencies is about to change

Digital transformation for Federal agencies is about to change

  Guest Author: Dan Faules, Leader, Systems Engineering at Cisco   For Federal agencies, Enterprise Infrastructure Solutions (EIS) has provided a comprehensive, solution-based method to address their IT telecommunications and infrastructure needs. Over the years, EIS has seen many changes that directly impact stakeholders. But its primary purpose as a key driver for the digital transformation of enterprise telecommunications and networking solutions remains unchanged. Yet many agencies, such as Networx and WITs, face contract expirations…

Read More

SASE and SSE: what you need to know – Cisco Blogs

SASE and SSE: what you need to know – Cisco Blogs

Technology advances are meant to improve our lives, from better protection to faster connections to simplifying and streamlining processes for better efficiency. But with every new advancement and innovative framework there seems to come a new acronym to keep track of in the already crowded space of cybersecurity tech terms. C2. CSIR. SASE. And now, Security Service Edge, or SSE. What is SSE? Cloud adoption, distributed workforces, and threats have been on the rise for…

Read More

Verizon Business adds VMware SD-WAN to its managed services

Verizon Business adds VMware SD-WAN to its managed services

Verizon Business has added VMware to its global managed-SD-WAN portfolio as part of its Network as a Service (NaaS) strategy. Verizon made the announcement at the Mobile World Conference event in Barcelona. Verizon’s Managed SD-WAN is designed for hybrid-cloud environments and uses application-aware routing to make sure customer data takes the right path to its destination. This allows customers to use their private network for demanding, latency-sensitive apps while sending less critical data over public…

Read More

SSE is SASE minus the SD-WAN

SSE is SASE minus the SD-WAN

SASE adoption has been skyrocketing since the start of the pandemic. Secure access service edge, a term Gartner coined in 2019, combines security and networking in a single, scalable, cloud-based platform that fits well in a world in which employees work from home and mostly access cloud-based apps and services. Now Gartner is pushing a new acronym. Turns out, companies might prefer to get their SASE without the “A” — just security service edge, or…

Read More

Back to basics: Make sure VMs don’t exceed host capacity

Back to basics: Make sure VMs don’t exceed host capacity

At the agency where I work we recently bought software products that required new virtual machines, and that provided the opportunity to review some of the important basices of properly assigning the hardware memory and compute to each VM. That’s important so we stay in a failover-ready state, and in our environment, that means appropriately allocating resources of the two clustered physical hosts that run VMs for our production applications. It’s even more important now…

Read More

How Opportunity International empowers financial inclusion through digital banking – Cisco Blogs

How Opportunity International empowers financial inclusion through digital banking – Cisco Blogs

The Transformational Tech series highlights Cisco’s nonprofit grant recipients that use technology to help transform the lives of individuals and communities. Opportunity International’s (Opportunity) mission for over five decades has been to reach those living in poverty and offer them access to otherwise unavailable financial opportunities, like loans, savings accounts, and capacity-building services. Far and above these basic services, Opportunity International and Cisco worked together to design, test, and scale innovative digital solutions that can…

Read More

Cisco’s 7 Guiding Principles of Government Data Demands – Cisco Blogs

Cisco’s 7 Guiding Principles of Government Data Demands – Cisco Blogs

At Cisco, we empower our customers to control their data. Protecting the privacy, integrity, and confidentiality of data in our possession is of utmost importance. In a world of advancing cyberthreats, expanding extraterritorial legislation, and growing concerns for data localization, we understand technology companies have an outsized responsibility to ensure customers have the power to make important decisions about their data. Like all global technology companies, there are scenarios when Cisco receives demands from law…

Read More

Ukraine internet battered but not out

Ukraine internet battered but not out

While the physical war in Ukraine is already a humanitarian disaster, the virtual war over the internet and the tech companies that run it and operate on it will likely get a lot worse. That’s because for the most part the actual internet network has withstood the onslaught since Russia invaded Ukraine. There have been outages and extreme slowness in parts of the country and malware or other threats have proliferated but in general—to the…

Read More

NSA urges businesses to adopt zero trust principles for network security

NSA urges businesses to adopt zero trust principles for network security

The National Security Agency this week issued detailed recommendations for businesses trying to secure their networking infrastructure against attacks, giving safe configuration tips for commonly used networking protocols and urging the use of basic security measures for all networks. The NSA’s report began by highlighting the importance of zero trust principles for network security, but the bulk of it covers specific steps network administrators should take to keep their infrastructure safe from compromise. Configuration tips…

Read More

NSA urges businesses to adopt zero trust for network security

NSA urges businesses to adopt zero trust principles for network security

The National Security Agency this week detailed recommendations for businesses to secure their network infrastructure against attacks, giving safe configuration tips for commonly used networking protocols and urging the use of basic security measures for all networks. The NSA’s report highlighted the importance of zero trust principles for network security, but the bulk of it covers specific steps network administrators should take to keep their infrastructure safe from compromise. Configuration tips for network admins include…

Read More
1 1,200 1,201 1,202 1,203 1,204 1,519