Recently, I have been working to upgrade Cisco network devices, mainly routers and switches, for a client. A recent network audit identified fragmentation in the IOSes and also security advisories. As a result, all the routers and switches required upgrades and it was a good opportunity for the client to standardize the IOSes for the different type of network devices in the environment.
As promised, in this entry to our ISE blog series we are going to begin our adventure into Cisco TrustSec, or CTS for short. When I am approaching a new technology, I find it helpful to not only understand what it is, but also why it exists. So, in this post, we’re going to attempt to cover just that; what is Cisco TrustSec and why do I care?
If you haven’t heard, Cisco is redesigning their certification programs. Starting February 24, 2020 this new design will be in place. Let’s take a look at the upcoming changes.
Last week was the long-awaited Cisco Live 2019! And two of our wonderful engineers wrote up their thoughts on the week. For a quick recap check out Dominic Zeni's overview of the week below and if you want a more in-depth recap check out Trevor Butler's deep dive into the Cisco Live 2019 World.
For the Short Attention Span Readers:
Another year, another Live! Building Bridges was one of the themes of this years’ Cisco Live and you can see it ringing true across the portfolio. Take Cisco Umbrella for example. It is no longer just a DNS layer security tool. Using the cloud-native Umbrella application, Cisco has built integrations to CloudLock, SDWAN, and soon ThreatGrid. With just the click of a button from your vManage, you can build tunnels (bridges??) from your SDWAN to your Umbrella and begin leveraging the full featured Umbrella Secure Internet Gateway. Or how about Cognitive Collaboration, building bridges to well…everywhere! Taking in contextual information from the Internet in all forms, Cognitive Collaboration promises to make us more prepared, more productive, and more successful in the meetings we attend. The new SVP of Collab, Amy Chang, came to Cisco through an acquisition of Accompany (the technology at the heart of Cognitive Collab). I’m very excited for the things to come from Amy’s team and Cognitive Collaboration. At the heart of all of these technological bridges are API’s. So, where’s the bridge for me as a traditional systems or network engineer that takes me from the CLI or the GUI to the API? Enter the new DevNet certifications announced at Cisco Live. A path (bridge??) for learning is very helpful when approaching an ocean of new technology and I’m excited to see what it’s all about! - Dominic Zeni
For The Insatiable Readers:
This year Cisco Live was held in sunny San Diego. Between the breakout sessions, the walk-in labs, and an amazing performance by Weezer and the Foo Fighters, Cisco announced some new products and new certifications.
In our previous entries to this series, we’ve deployed ISE, integrated it with Microsoft AD, and configured the ISE server-side certificates. All of that being completed, we are now ready to configure our Policy Set for 802.1X and test it out.
Hello loyal blog readers. Over the last few weeks I have been busy working on a network assessment for one of our fantastic customers. One of the areas we look at when assessing a customer’s network is how they are protecting/restricting access to the management plane of their network infrastructure.
Technology is constantly moving and advancing, and as we continue to innovate we are able to use different enterprise technologies to grow our business. Technology used to be a means to help operate the business but has transformed into a means to better the business beyond those day-to-day operations. Technology is connecting our teams, connecting us with our customers and helping us to serve those customers more efficiently.
This week is week 3 of National Cybersecurity Awareness Month (NCSAM). Each week of NCSAM is focused around a different theme meant to address specific challenges organizations face and identify how to address those challenges. Week 3 is focused around educating employees of the importance of online security and safety and their role in keeping your organization safe from online threats.
Halloween is coming and most of us are looking forward to haunted houses, scary movie marathons, and spooky decorations. October is about more than the candy, costumes, tricks and treats for IT teams and cybersecurity experts – it’s National Cybersecurity Awareness Month.
It’s our favorite time of year again – October. This love for October is more than the fall weather, leaves changing, upcoming holidays and pumpkin spice everything. October is National Cyber Security Awareness Month and here at LookingPoint we love cybersecurity.
Subscribe to the informative Newsletter to be Notified Updates in the Technology world.