Arista Networks to Announce Q2 2021 Financial Results on Monday, August 2nd, 2021

Arista Networks to Announce Q2 2021 Financial Results on Monday, August 2nd, 2021

Announces participation in upcoming investor events SANTA CLARA, Calif.–(BUSINESS WIRE)– Arista Networks, Inc. (NYSE:ANET) will release its financial results for the quarter ended June 30, 2021 after U.S. markets close on Monday, August 2nd, 2021. The results will be included in a press release with accompanying financial information that will be posted on the Investor Relations section of the Arista website at https://investors.arista.com. Arista’s executive management team will host a conference call on August 2nd,…

Read More

Dell Technologies to Hold Investor Conference Call July 13 to Discuss its ESG Strategy | Dell Technologies

Dell Technologies to Hold Investor Conference Call July 13 to Discuss its ESG Strategy | Dell Technologies

ROUND ROCK, Texas, July 2, 2021 /PRNewswire/ — Dell Technologies (NYSE: DELL) will conduct a conference call Tuesday, July 13, 2021 at 3:00 p.m. CT / 4:00 p.m. ET to discuss its Environmental, Social and Governance or ESG Strategy. Speakers will include Dell Technologies’ chief corporate affairs officer, Jennifer (JJ) Davis; chief diversity and inclusion officer, Vanice Hayes; and senior vice president of investor relations, Rob Williams.    A live webcast and a replay of the webcast…

Read More

10 competitors Cisco just can’t kill off

10 competitors Cisco just can’t kill off

In compiling this iteration of our list of competitors Cisco can’t kill off, one thing is clear: The competition is fierce amongst the bigger players. Nearly all the networking giant’s competitors have refreshed their product lines or bought into technology to compete more closely with Cisco. But that’s not to say Cisco has been sitting still by any means. The company has expanded and refreshed its core Catalyst, Nexus and Silicon One networking gear and…

Read More

The Convergence of Security and Networking is Driven by the Hybrid Workforce

The Convergence of Security and Networking is Driven by the Hybrid Workforce

Much has been written about the convergence of security and networking. Often the focus is on one side or the other. Networks need to be more secure. And security needs to take the network into account. But what’s often ignored is that the convergence of security and networking is driven by the needs of a hybrid and distributed workforce. And networks and security need to evolve—and converge—to meet those needs. Case in point: because of…

Read More

Home Sweet Office – Cisco Blogs

Home Sweet Office – Cisco Blogs

As a second-generation Cisconian, I grew up watching my dad work from home for the past 20 years. This work-life balance and flexibility, for the longest time, has been part of Cisco’s DNA. We’re the technology that keeps us all connected – the technology that enables us to work from anywhere – and the technology that played a huge role of helping us through 2020 and the many changes we all experienced. Now, six years…

Read More

Should the CISO Report to the CIO?

Should the CISO Report to the CIO?

The Chief Information Security Officer (CISO) is the organization’s senior executive in charge of the cybersecurity and the information technology risk management posture of the enterprise. He or she is a seasoned executive who must be equally adept at leading the myriad technology functions associated with protecting the enterprise’s information and data from misuse and compromise, as well as at managing the deeper business aspects of the role, such as hiring, developing, and retaining qualified…

Read More

Women Rock-IT, or Rock-ET? Australian rocket scientist connects Earth’s framework from space – Cisco Blogs

Women Rock-IT, or Rock-ET? Australian rocket scientist connects Earth’s framework from space – Cisco Blogs

Flavia Tata Nardini, CEO of Fleet Space and Mission Chair of the Seven Sisters Moon Mission This blog post comes from Flavia Tata Nardini, an Australian-based rocket scientist, CEO of Fleet Space, and the Mission Chair of the Seven Sisters Moon Mission, who has launched six nanosatellites into Low Earth Orbit to help power the Internet of Things. Learn how Flavia uses her STEM knowledge in space at Cisco’s upcoming Women Rock-IT broadcast on July…

Read More

New release, Cisco ISE 3.1 is all about APIs, Ansible, and Automation

New release, Cisco ISE 3.1 is all about APIs, Ansible, and Automation

A trifecta of ISE (Identity Services Engine) power is coming your way via DevNet First, we have a brand-new ISE 3.1 sandbox. Second, we have new learning labs that show you what you can do in the sandbox. Third, and most importantly, we have a webinar coming up next week to go through all this exciting stuff. Now before we go into the details of all of these items, it makes sense to talk about…

Read More

A Conversation on Zero Trust for the Modern World

A Conversation on Zero Trust for the Modern World

Insights from Cisco VP/GM of Zero Trust and Duo, Ash Devata  I recently had a conversation with Cisco’s VP/GM of Zero Trust and Duo, Ash Devata, who knows more than a thing or two about zero trust. Ash joined Cisco in 2018 via Cisco’s acquisition of Duo Security. Duo is the leading provider of multi-factor authentication (MFA) and zero trust for the workforce, combining security expertise with a user-centered philosophy to provide two-factor authentication, endpoint remediation and secure single sign-on tools for the modern era. Prior to Cisco’s Duo acquisition, Ash led Duo’s Product Management, Product Marketing, Technology Partnerships, and Advisory…

Read More

TrustSec – 9800 vs 8540 Wireless LAN Controller deployment – Cisco Blogs

TrustSec – 9800 vs 8540 Wireless LAN Controller deployment – Cisco Blogs

To protect business critical data, the network needs to be segmented. But traditional methods are complex. Cisco TrustSec provides a simple way to segment and apply polices uniformly across the network. Traditional network segmentation approaches use IP address-based access control lists (ACLs), VLAN segmentation, and firewall policies that require extensive manual maintenance. Therefore, every device in the network that needs to enforce security policies would require manual configuration. For instance, any change to policies would…

Read More
1 988 989 990 991 992 1,156