Cisco Intercloud: Moving Beyond The Barrier

Together with our partners, Cisco is building the Intercloud – the globally connected network of clouds – delivering secure cloud applications and infrastructure everywhere in the world. Service orchestration is a key challenge facing CIOs today. They face increasing demands for automation, infrastructure and data alignment.  Yet, when they turn to a single vendor for cloud services, instead of a robust and connected partner ecosystem, they are settling for limited services, less opportunity for innovation and restrictions on network connectivity and data movement. In essence, a one vendor cloud solution can trap a customer in a world of isolated clouds...

Cisco Cloud Thought Leaders

Featured Article

By Steve Martino

Cloud computing has reached a tipping point as many organizations have either adopted, or are planning to adopt, some form of cloud computing technology – whether IT knows and manages it or not. “Speed to capability” is one of the primary reasons that individuals, business units and departments are using cloud technology and service providers with increasing frequency. Yet, despite the rapidly increasing use of cloud services, many IT executives remain hesitant to endorse a “cloud-first” approach

world-of-many-clouds

What’s worse is that there are some organizations that are not convinced they should adopt cloud-based services, citing security and privacy concerns, operational challenges or inability to control information. Unfortunately, the reluctance to migrate to the cloud can increase an organization’s risk rather than mitigating it...

Continue Reading

 

RSS Security – Cisco Blog

  • The Rising Tides of Spam September 21, 2016
    This blog post was authored by Jaeson Schultz. For the past five years we have enjoyed a relatively calm period with respect to spam volumes. Back at the turn of the decade the world was experiencing record-high volumes of spam. However, with the evolution of new anti-spam technologies, combined with some high-profile takedowns of spam-related […]
  • The True Value of Network Security Monitoring September 20, 2016
    The Enterprise Strategy Group (ESG) conducted research into how cybersecurity professionals view network security monitoring and how they use it in their organization. The report Network Security Monitoring Trends surveyed 200 IT and cybersecurity professionals who have a knowledge of or responsibility for network security monitoring. Some of the key findings include: Many organizations now […]
  • Cognitive Threat Analytics: Turn Your Proxy Into Security Device September 19, 2016
    This post was authored by Veronica Valeros, Petr Somol, Martin Rehak and Martin Grill, on behalf of the whole CTA team. Some of us still intuitively believe that our extensively safeguarded corporate networks are safe from the risks we are exposed to when connecting directly to public Internet. Yet, evidence suggests that most companies now […]