In the time it takes to get up from your desk, walk downthe hallway and make a cup of coffee, a Cisco Mobility Express enterprise-level wireless network can be configured and deployed. You don't even have to be chained to your des...
Historically, threat actors have targeted network devices to create disruption through a denial of service (DoS) situation. While this remains the most common type of attack on network devices, we continue to see advances that foc...
This post was authored by Earl Carter, Alex Chiu, Joel Esler, Geoff Serrao, and Brandon Stultz. Defining what is malware relies on determining when undesirable behavior crosses the line from benign to clearly unwanted. The lack of...
As the technology landscape continues its rapid transformation, those who work in the industry are faced with the constant challenge of keeping their skills up-to-date. To address the needs of professionals looking to build, asses...
Guest Blog by Ian Ross, SP Business Development Manager As businesses globally begin to recognize the potential of the Internet of Everything (IoE) in terms of how they structure, manage and improve their operations, it's le...
As today's mobile world evolves with the explosion of mobile and connected devices, small to medium-sized businesses are increasingly faced with the same wireless challenges and opportunities as large enterprises. To help our cust...
Someone at a meeting recently told me how cool it was that big data was finally moving out of the early adopter phase. He's lucky I wasn't drinking a beverage at the time, or he might have ended up wearing it. I'm accused of ...
As digital textbooks, laptops and tablets becomes the new normal of classroom tools -but education budgets for resources and personnel decline -Cisco's Mobility Express Solution provides educators with consistent, secure and easy-...
As application performance, security and delivery get more critical, and as the need for network automation grows, the vision of an architecture that allows easy integration of L4-7 services into the data center fabric is increasi...
The Cisco IPS network based intrusion prevention system (NIPS) uses signatures to detect network-based attacks. Signatures can be created in a variety of engines based on the type of network traffic being inspected. Cisco signatur...
We've been hearing a lot about the Internet of Things or IoT. How it's going to accelerate efficiencies. Grow profits. Disrupt industries. So it's time to consider if IoT is real & if you should do something about it right now...
Similar to previous versions of the standard, the MPI-3.1 standard is now available in hardcover. Even though I have a copy of the MPI-3.1 PDF for quick/easy reference on my laptop, I find something intangibly inherently useful (a...