Keeping on top of the latest security trends, threats and solutions is an increasingly difficult task. To help security teams keep track, we’ve broken down Cisco’s 2020 Cybersecurity Report and pulled the top five highlights that all security professionals should know.
Posts by Josh Cronin
As storage volumes continue to grow and enterprises make use of secondary storage to manage corporate data, they also need to backup these storage solutions. However, incorporating secondary storage into an enterprise-wide backup and recovery strategy is not always simple.
Today, there are few industries where enterprises have yet to undergo some form of digital transformation. Over the last few decades, businesses have undergone digitization at unparalleled speeds. Networking solutions are at the heart of these changes and can be the key that allows enterprises to adjust and meet the changing needs of their business.
New realizations continue to be unveiled as a result of the global pandemic being played out. People are reevaluating how they shop, travel and work within their daily lives. Businesses are realizing that enterprise users don’t have to be in the office at an assigned desk to do their jobs well. In fact, in the new normalized era of wireless mobility, going to the office everyday from 9 to 5 is starting to sound a bit antiquated.
Although it may not seem like it, the pandemic crisis that is currently engulfing the world will one day pass. Its aftershocks however will be experienced for the coming decade. Governments, businesses, consumers and travelers are undergoing reassessments in order to determine a better way of doing things. Many things are going to change as a result. The process of determining the maximum capacity of a building has potential to change. The travel industry will undoubtedly perform density studies in how they transport people. Corporate executives are also examining the densification of their offices.
As companies grow and cloud models change and develop, whether you have AWS or Azure, most people aren't finding that they use one single cloud provider and stick with them. They use clouds from multiple providers, creating a hybrid cloud environment with multiple data centers. When you mix public clouds into this strategy, whether it be AWS, Azure, or Google, it is important to realize that every time a cloud connection is made there is usually connectivity back to your sites as well. You have that increased traffic flow and you have to consider how you're connecting, managing, and securing it.
In last week's post we discussed the Cisco Tetration Analytics Platform—what the platform is and how it integrates with the modern enterprise. We talked about how it supports a “Zero-Trust” security model and explained the story that ties in with its creation with an interesting use case involving Cisco and WEI.
How much visibility do you have into your organization’s network? How confident is your IT team in its ability to accurately map out the network, which is a necessary step in data center migrations. According to a white paper from IDC, a mere 18% increase in network visibility can improve security breach preventative measures by over 40%. Many organizations know there are devices on their network that are unaccounted for, but many do not have a way of even guessing how many devices that is, let alone strategizing how to secure them.
Networks are continuously undergoing some level of transformation and conversion to new technologies and bandwidth capabilities. It is the nature of the beast and one that data center managers are all too familiar with. However, IT leaders are facing increasing levels of required network alterations and conversions today due to several emerging trends:
Hyperconverged infrastructure benefits are clear, as is the trend toward mainstream enterprise adoption. However, not all companies are on board with this new type of software-driven data center innovation. Because of technical and licensing challenges, larger companies are quicker to make the adoption than smaller businesses. The three main organizational groups that can really benefit from this technology are: