Last week was the long-awaited Cisco Live 2019! And two of our wonderful engineers wrote up their thoughts on the week. For a quick recap check out Dominic Zeni's overview of the week below and if you want a more in-depth recap check out Trevor Butler's deep dive into the Cisco Live 2019 World.
For the Short Attention Span Readers:
Another year, another Live! Building Bridges was one of the themes of this years’ Cisco Live and you can see it ringing true across the portfolio. Take Cisco Umbrella for example. It is no longer just a DNS layer security tool. Using the cloud-native Umbrella application, Cisco has built integrations to CloudLock, SDWAN, and soon ThreatGrid. With just the click of a button from your vManage, you can build tunnels (bridges??) from your SDWAN to your Umbrella and begin leveraging the full featured Umbrella Secure Internet Gateway. Or how about Cognitive Collaboration, building bridges to well…everywhere! Taking in contextual information from the Internet in all forms, Cognitive Collaboration promises to make us more prepared, more productive, and more successful in the meetings we attend. The new SVP of Collab, Amy Chang, came to Cisco through an acquisition of Accompany (the technology at the heart of Cognitive Collab). I’m very excited for the things to come from Amy’s team and Cognitive Collaboration. At the heart of all of these technological bridges are API’s. So, where’s the bridge for me as a traditional systems or network engineer that takes me from the CLI or the GUI to the API? Enter the new DevNet certifications announced at Cisco Live. A path (bridge??) for learning is very helpful when approaching an ocean of new technology and I’m excited to see what it’s all about! - Dominic Zeni
For The Insatiable Readers:
This year Cisco Live was held in sunny San Diego. Between the breakout sessions, the walk-in labs, and an amazing performance by Weezer and the Foo Fighters, Cisco announced some new products and new certifications.
As IT consultants in the Bay Area, we see a lot of startups. Small businesses with bold ideas filled with hard working people focused on achieving a specific goal. Usually in their infancy, these businesses focus all their time and money on the goal they are trying to achieve and usually don’t have the dedicated staff needed to support enterprise IT solutions. The employees are extremely sharp and very tech savvy, able to quickly piece together solutions to fit their needs that actually work pretty well. Ran out of ports on a switch? Order an inexpensive PoE switch and start daisy chaining them! More ports = problem solved. Same goes for wireless, if you have a dead spot, just get another AP. If you want video in a conference room, get some 3rd party camera to work with Google Hangouts.
Healthcare is one of the most rapidly changing industries. It’s a constant challenge for healthcare organizations to keep up with changing regulations, complex reimbursement rules, ongoing revenue challenges, and evolving security threats. To keep up with the digital transformation, you need a technology foundation that will secure your environment and foster innovation.
Currently I am working on a project where I am going through and optimizing a large set of Access Control Lists (ACL) on a set of 5585 Firewalls. While going through each ACL I have noticed a few mistakes other engineers have made while configuring these rules. I have compiled a list of these common mistakes. The focus of this blog will be around ACLs on Cisco ASA’s; however these rules still apply to other devices as well.
Enjoy the first Fireside Chat. Fireside Chats are a LookingPoint video series where we bring casual technology conversations to you! This week we are discussing one of the hottest topics of 2017: SD-WAN. Sit back, relax, and enjoy a nice fireside chat.
Learn more about SD-WAN here.
Today, the most significant cyber threat is Ransomware – a type of malicious software designed to hold a user’s files (such as healthcare records, financial contracts, software codes, and other documents) for ransom by encrypting them and demanding the user pay a fee to decrypt them. Ransomware attacks use sophisticated infrastructure and resilient techniques to target data and hold critical infrastructure hostage. This advanced cyber threat, a familiar–and unwelcome–issue in IT security circles, has become one of the top enterprise cyber-security threats of 2016. Ransomware is the most profitable malware in history – in the first 3 months of 2016 cyber-criminals collected $209 million!
Meraki does it again! Meraki is no longer just simplifying networking; they are on a mission to simplify IT as a whole. On Tuesday, September 13, 2016 Meraki announced the launch of a brand new product line; Security Cameras. Just like all things Meraki, the MV series is plug and play, requires no additional on-premise hardware and is 100% cloud managed. This means no more network video recorder (NVR) and no more standalone video management software (VMS). Best of all, MV cameras are configured, managed, and monitored on Meraki’s single pane of glass web dashboard alongside your wireless, switching, network security, mobility management, and communication solutions.
Cisco Live 2016 has come to a close and the LookingPoint engineers who attended are feeling excited and inspired by all they learned in Las Vegas last week. They have shared with us their favorite takeaways from CLUS 2016 and we want to share them with you!
Subscribe to the informative Newsletter to be Notified Updates in the Technology world.