{"id":178908,"date":"2017-02-22T03:49:13","date_gmt":"2017-02-22T08:49:13","guid":{"rendered":"http:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/cisco-deepens-enterprise-network-virtualization-security-detection-of-dna-suite-network-world\/"},"modified":"2017-02-22T03:49:13","modified_gmt":"2017-02-22T08:49:13","slug":"cisco-deepens-enterprise-network-virtualization-security-detection-of-dna-suite-network-world","status":"publish","type":"post","link":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/transhuman-news-blog\/dna\/cisco-deepens-enterprise-network-virtualization-security-detection-of-dna-suite-network-world\/","title":{"rendered":"Cisco deepens enterprise network virtualization, security detection of DNA suite &#8211; Network World"},"content":{"rendered":"<p><p>    Cisco today announced a variety of hardware, software and    services designed to increase network virtualization and    bolster security for campus, branch office and cloud customers.  <\/p>\n<p>    The products, which include a Network Functions Virtualization    branch office device and improved security network segmentation    software, fall under Ciscos overarching Digital Network    Architecture plan. DNA offers integrated networking    softwarevirtualization, automation, analytics, cloud service    management and security under a single suite.  <\/p>\n<p>    +More Cisco News on Network World:     Cisco reserves $125 million to pay for faulty clock component    in switches, routers+  <\/p>\n<p>    DNA offers IT leaders a blueprint for building digital ready    networks. In just under 18 months we have seen    over1,900    organizations deploy our SDN controller, APIC-EM, in their    networks and start laying a foundation capable of enabling    their digital transformation, said Ciscos Prashanth Shenoy,    vice president of marketing, Enterprise Networking and    Mobility.  <\/p>\n<p>    On the hardware side, Cisco rolled out the Enterprise Network    Compute System (ENCS) 5400 Series, a 1RU Intel Xeon server that    includes an eight-port GE Switch which supports LTE, T1, DSL    and more, as well as Dual-Phy Gigabit Ethernet WAN connectivity    and 64Gb of memory.  <\/p>\n<p>    The 5400 a purpose-built branch platform aimed at helping    customers accelerate their Enterprise NFV deployments by    extending routing, security, WAN optimization and other network    services to their branch environments, Shenoy said.  <\/p>\n<p>    The 5400 is all about the speed and agility in setting up a    branch office rollout that secures virtualized services,\"    Shenoy said. A branch office that took days to set up and    provision previously can now be done virtually in minutes with    security, QoS and management capabilities.  <\/p>\n<p>    Cisco does offer other SD-WAN packages and the 5400 is another    option but one that focuses on customers interested in    virtualizing network functions, experts said.  <\/p>\n<p>    For security, Cisco extended its TrustSec security software    across all its network components and offers security    segmentation to isolate attacks and restrict threats in the    network.  <\/p>\n<p>    TrustSec 6.1 now extends from the campus to the branch office    and the cloud, all in an effort to avoid and prevent pervasive    threats Shenoy said.  <\/p>\n<p>    In that vein, Cisco also enhanced its Identity Services Engine    (ISE). ISE 2.2 offers much deeper visibility into applications    on endpoints, including detection of anomalous behavior. It    also offers more granular control with the ability to define    \"DEFCON\" policy sets that lets customers escalate their    response to prolific threats, Shenoy stated.  <\/p>\n<p>    Together ISE and TrustSec can help turn the network into a    sensor and enforcer, Cisco said. ISE provides visibility and    control of users and devices on the network, while TrustSec    provides software-defined segmentation to isolate attacks and    restrict movement of threats in the network.  <\/p>\n<p>    Rather than changing the authorization of individual users and    devices, or implementing policy changes manually, changing    DEFCON state changes the TrustSec policies defining how users,    devices, and systems can talk to others  essentially raising    the network drawbridges to protect your critical data and    maintaining essential services. For example, you could define    DEFCON 4 to kick all guests off the network, DEFCON 3 to kick    all BYOD users off the network, DEFCON 2 to restrict    peer-to-peer traffic, and DEFCON 1 to severely limit access to    your crown jewels, wrote Kevin    Skahill, director, product management in Ciscos Secure    Access and Mobility Product Group in a blog detailing the new    security software.  <\/p>\n<p>    ISE 2.2 also provides streamlined workflows that include guest,    secure access, and BYOD setup with     Cisco Wireless LAN Controllers in as little as 10 minutes.    This approach also extends to customers migrating from the        Cisco Access Control System (ACS), which Cisco recently    announced will go     end-of-sale, Skahill stated.  <\/p>\n<p>    On the services side, Cisco announced an online     DNA Advisor and network assessment tool that helps    customers define their digital network. The company also    announced DNA Advisory Services that will offer in-depth    consulting to help enterprises formulate a digital strategy.  <\/p>\n<p>    Cisco dovetailed the DNA announcement with the     release of a study that looked at the issues surrounding    what it calls digital-ready networks. Conducted by IDC and    commissioned by Cisco, the research surveyed 2,054 global    organizations across 10 countries to determine the digital    readiness of their networks. A couple findings from the study    included:  <\/p>\n<p>    Outdated infrastructure characteristics such as manual    configuration and management processes, overlay security geared    mainly toward external threats, and siloed network domains    hinder the networks ability to further the goals of digital    business. For IT staff, valuable time is spent keeping the    lights on instead of aligning network capabilities with    strategic initiatives that improve operational efficiency and    enhance customer experience. A network that is truly digital    ready is a network that can dynamically align with the    ever-changing needs of the enterprise. That means a network    that allows more agility and faster time to innovation, better    security, and greater operational efficiency and simplicity,    IDC wrote.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Read the rest here:<br \/>\n<a target=\"_blank\" href=\"http:\/\/www.networkworld.com\/article\/3171080\/cisco-subnet\/cisco-deepens-enterprise-network-virtualization-security-detection-of-dna-suite.html\" title=\"Cisco deepens enterprise network virtualization, security detection of DNA suite - Network World\">Cisco deepens enterprise network virtualization, security detection of DNA suite - Network World<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> Cisco today announced a variety of hardware, software and services designed to increase network virtualization and bolster security for campus, branch office and cloud customers. The products, which include a Network Functions Virtualization branch office device and improved security network segmentation software, fall under Ciscos overarching Digital Network Architecture plan. DNA offers integrated networking softwarevirtualization, automation, analytics, cloud service management and security under a single suite <a href=\"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/transhuman-news-blog\/dna\/cisco-deepens-enterprise-network-virtualization-security-detection-of-dna-suite-network-world\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":7,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[26],"tags":[],"class_list":["post-178908","post","type-post","status-publish","format-standard","hentry","category-dna"],"_links":{"self":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/178908"}],"collection":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/comments?post=178908"}],"version-history":[{"count":0,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/178908\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/media?parent=178908"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/categories?post=178908"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/tags?post=178908"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}