Cisco has unified its two, largely separate, collaboration packages – Spark and WebEx – into a single platform that supports a single set of features.The move makes sense because Cisco had been developing the somewhat similar packages separately, and there was some confusion about that in the market and sales channels. No more.[ Don’t miss customer reviews of top remote access tools and see the most powerful IoT companies . | Get daily insights by signing up for Network World newsletters. ]
Webex Teams combines collaboration features in Cisco Spark and WebEx such as whiteboarding, persistent messaging, roster, meeting controls, content sharing and so on. To read this article in full, please click here
Cisco has rolled out software tools for helping customers control access and more easily manage the burgeoning amount of enterprise IoT devices in their networks. The company has also begun filling out its Catalyst 9000 line of intent-based networking (IBN) switches with new boxes aimed at customers wanting 100G/sec and 25G/sec network migration options.[ For more on IoT see tips for securing IoT on your network, our list of the most powerful internet of things companies and learn about the industrial internet of things. | Get regularly scheduled insights by signing up for Network World newsletters. ]
IoT access control, security, management
The need for much better enterprise IoT access control is obvious, Cisco says: According to its Midyear Cybersecurity Report for 2017 most companies are not aware of what IoT devices are connected to their network.To read this article in full, please click here
Cisco has rolled out software tools for helping customers control access and more easily manage the burgeoning amount of enterprise IoT devices in their networks. The company has also begun filling out its Catalyst 9000 line of intent-based networking (IBN) switches with new boxes aimed at customers wanting 100G/sec and 25G/sec network migration options.[ For more on IoT see tips for securing IoT on your network, our list of the most powerful internet of things companies and learn about the industrial internet of things. | Get regularly scheduled insights by signing up for Network World newsletters. ]
IoT access control, security, management
The need for much better enterprise IoT access control is obvious, Cisco says: According to its Midyear Cybersecurity Report for 2017 most companies are not aware of what IoT devices are connected to their network.To read this article in full, please click here
Cisco has added new cloud and virtual deployment options for customers looking to buy into its Tetration Analytics security system.Cisco’s Tetration system gathers information from hardware and software sensors and analyzes it using big-data analytics and machine learning to offer IT managers a deeper understanding of their data center resources.[ Don’t miss customer reviews of top remote access tools and see the most powerful IoT companies . | Get daily insights by signing up for Network World newsletters. ]
Tetration can improve enterprise security monitoring, simplify operational reliability, give customers a single tool to collect consistent security telemetry across the entire data center and analyze large volumes of data in real time. To read this article in full, please click here
Cisco has added new cloud and virtual deployment options for customers looking to buy into its Tetration Analytics security system.Cisco’s Tetration system gathers information from hardware and software sensors and analyzes it using big-data analytics and machine learning to offer IT managers a deeper understanding of their data center resources.[ Don’t miss customer reviews of top remote access tools and see the most powerful IoT companies . | Get daily insights by signing up for Network World newsletters. ]
Tetration can improve enterprise security monitoring, simplify operational reliability, give customers a single tool to collect consistent security telemetry across the entire data center and analyze large volumes of data in real time. To read this article in full, please click here
Cisco has added new cloud and virtual deployment options for customers looking to buy into its Tetration Analytics security system.Cisco’s Tetration system gathers information from hardware and software sensors and analyzes it using big-data analytics and machine learning to offer IT managers a deeper understanding of their data center resources.[ Don’t miss customer reviews of top remote access tools and see the most powerful IoT companies . | Get daily insights by signing up for Network World newsletters. ]
Tetration can improve enterprise security monitoring, simplify operational reliability, give customers a single tool to collect consistent security telemetry across the entire data center and analyze large volumes of data in real time. To read this article in full, please click here
The notion of disaggregation – separating the operating system and applications from the underlying hardware – has always been a conundrum for Cisco. In a nutshell, why would the company risk losing all of the millions of dollars in development and the key networking features tied up in current Cisco hardware and software packages?But in the new world of all-things software in which Cisco plans to be king, the disaggregation strategy is gaining momentum.[ Check out REVIEW: VMware’s vSAN 6.6 and hear IDC’s top 10 data center predictions . | Get regularly scheduled insights by signing up for Network World newsletters. ]
This week the company took things a step further in announcing a variety of disaggregation steps enterprise and service provider customers could be interested in.To read this article in full, please click here
The notion of disaggregation – separating the operating system and applications from the underlying hardware – has always been a conundrum for Cisco. In a nutshell, why would the company risk losing all of the millions of dollars in development and the key networking features tied up in current Cisco hardware and software packages?But in the new world of all-things software in which Cisco plans to be king, the disaggregation strategy is gaining momentum.
[ Learn about how server disaggregation can boost data center efficiency and learn the how Windows Server 2019 embraces hyperconverged data centers . | Get regularly scheduled insights by signing up for Network World newsletters. ]
This week the company took things a step further in announcing a variety of disaggregation steps enterprise and service provider customers could be interested in.To read this article in full, please click here
The notion of disaggregation – separating the operating system and applications from the underlying hardware – has always been a conundrum for Cisco. In a nutshell, why would the company risk losing all of the millions of dollars in development and the key networking features tied up in current Cisco hardware and software packages?But in the new world of all-things software in which Cisco plans to be king, the disaggregation strategy is gaining momentum.
[ Learn about how server disaggregation can boost data center efficiency and learn the how Windows Server 2019 embraces hyperconverged data centers . | Get regularly scheduled insights by signing up for Network World newsletters. ]
This week the company took things a step further in announcing a variety of disaggregation steps enterprise and service provider customers could be interested in.To read this article in full, please click here
The notion of disaggregation – separating the operating system and applications from the underlying hardware – has always been a conundrum for Cisco. In a nutshell, why would the company risk losing all of the millions of dollars in development and the key networking features tied up in current Cisco hardware and software packages?But in the new world of all-things software in which Cisco plans to be king, the disaggregation strategy is gaining momentum.
[ Learn about how server disaggregation can boost data center efficiency and learn the how Windows Server 2019 embraces hyperconverged data centers . | Get regularly scheduled insights by signing up for Network World newsletters. ]
This week the company took things a step further in announcing a variety of disaggregation steps enterprise and service provider customers could be interested in.To read this article in full, please click here
Cisco and Verizon teamed up recently to show off the content-aware technology they say will seriously improve the performance and security of networks of the future, including 5G wireless and IoT environments.Cisco has long been a proponent of the technology known as Information Centric Networking (ICN), which lets applications request data by a name that is based on its content rather than its location (IP address).
[ Find out how 5G wireless could change networking as we know it and how to deal with networking IoT. | Get regularly scheduled insights by signing up for Network World newsletters. ]
Cisco says that by using such technology the network can locate and retrieve data dynamically from any source – an important feature for future mobile and IoT environments. As for improving security, Cisco says the technology secures and authenticates the data itself, rather than setting up point-to-point connections to authenticated hosts.To read this article in full, please click here
Cisco this week took the wraps off new software packages it claims will help customers manage their biggest networking blind spot: the software-defined wide area network or SD-WAN.The SD-WAN is typically made of diverse networks and technologies that many times are outside the control of IT. Add to that the increased use of multi-cloud services and other advances, and the traditional complexity of the WAN has been increased, Cisco stated.+RELATED: SD-WAN: What it is and why you'll use it some day; How to negotiate a Cisco Enterprise Agreement that works for you+To read this article in full, please click here
Cisco this week took the wraps off new software packages it claims will help customers manage their biggest networking blind spot: the software-defined wide area network or SD-WAN.The SD-WAN is typically made of diverse networks and technologies that many times are outside the control of IT. Add to that the increased use of multi-cloud services and other advances, and the traditional complexity of the WAN has been increased, Cisco stated.+RELATED: SD-WAN: What it is and why you'll use it some day; How to negotiate a Cisco Enterprise Agreement that works for you+To read this article in full, please click here
Cisco this week expanded its Tetration Analytics system to let users quickly detect software vulnerabilities and more easily manage the security of the key components in their data centers.Introduced in 2016, the Cisco Tetration Analytics system gathers information from hardware and software sensors and analyzes the information using big data analytics and machine learning to offer IT managers a deeper understanding of their data center resources. The idea behind Tetration includes the ability to dramatically improve enterprise security monitoring, simplify operational reliability and move along application migrations to Software Defined Networking.To read this article in full, please click here
Cisco this week expanded its Tetration Analytics system to let users quickly detect software vulnerabilities and more easily manage the security of the key components in their data centers.Introduced in 2016, the Cisco Tetration Analytics system gathers information from hardware and software sensors and analyzes the information using big data analytics and machine learning to offer IT managers a deeper understanding of their data center resources. The idea behind Tetration includes the ability to dramatically improve enterprise security monitoring, simplify operational reliability and move along application migrations to Software Defined Networking.To read this article in full, please click here
Are you getting the most out of your next generation firewall? Probably not if you take to heart recent research from SafeBreach.SafeBreach, a relative newcomer to the security arena -- it was founded in 2014 -- sells premise and service packages that continually run network breach simulations that help customers locate and remediate security problems.RELATED:
What is microsegmentation? How getting granular improves network security
Illumio extends its segmentation to the network and cloud
Specifically the company deploys software probes distributed throughout customers’ networks, and attempts to establish connections among devices and network segments just as a hacker would do in attacking your data. These breach attempts are defined by SafeBreach’s Hacker’s Playbook, a library of known attack methods that uncover network security weaknesses and how these vulnerabilities might be exploited.To read this article in full, please click here
Are you getting the most out of your next generation firewall? Probably not if you take to heart recent research from SafeBreach.SafeBreach, a relative newcomer to the security arena -- it was founded in 2014 -- sells premise and service packages that continually run network breach simulations that help customers locate and remediate security problems.RELATED:
What is microsegmentation? How getting granular improves network security
Illumio extends its segmentation to the network and cloud
Specifically the company deploys software probes distributed throughout customers’ networks, and attempts to establish connections among devices and network segments just as a hacker would do in attacking your data. These breach attempts are defined by SafeBreach’s Hacker’s Playbook, a library of known attack methods that uncover network security weaknesses and how these vulnerabilities might be exploited.To read this article in full, please click here
Are you getting the most out of your next-generation firewall? Probably not if you take to heart recent research from SafeBreach.SafeBreach, a relative newcomer to the security arena — it was founded in 2014 — sells premise and service packages that continually run network breach simulations that help customers locate and remediate security problems.RELATED:
What is microsegmentation? How getting granular improves network security
Illumio extends its segmentation to the network and cloud
Specifically the company deploys software probes distributed throughout customers’ networks, and attempts to establish connections among devices and network segments just as a hacker would do in attacking your data. These breach attempts are defined by SafeBreach’s Hacker’s Playbook, a library of known attack methods that uncover network security weaknesses and how these vulnerabilities might be exploited.To read this article in full, please click here
Are you getting the most out of your next-generation firewall? Probably not if you take to heart recent research from SafeBreach.SafeBreach, a relative newcomer to the security arena — it was founded in 2014 — sells premise and service packages that continually run network breach simulations that help customers locate and remediate security problems.RELATED:
What is microsegmentation? How getting granular improves network security
Illumio extends its segmentation to the network and cloud
Specifically the company deploys software probes distributed throughout customers’ networks, and attempts to establish connections among devices and network segments just as a hacker would do in attacking your data. These breach attempts are defined by SafeBreach’s Hacker’s Playbook, a library of known attack methods that uncover network security weaknesses and how these vulnerabilities might be exploited.To read this article in full, please click here
Fresh off a positive earnings call that saw Cisco report $11.9 billion in revenue for the 2Q 2018 – a 3 percent increase from the same quarter in 2017 and the first time in 6 quarters the company reported year-over-year sales increases – CEO Chuck Robbins has a lot to crow about. First of all, the company's most strategic new direction: The Network. Intuitive, more commonly known as intent-based networking is rapidly finding acceptance amongst customers, Robbins said.+RELATED: Getting grounded in intent-based networking; What is intent-based networking?+To read this article in full, please click here