Networking

01:48 PM
Connect Directly
RSS
E-Mail
50%
50%

Cisco Introduces 'Context Aware' Security Architecture, Leveraging Client Telemetry

Cisco Systems has unveiled its distributed SecureX architecture, which enables "context aware" security enforcement regardless of infrastructure environment. A key element is inclusion of client information through Cisco's TrustSec technologies, which enable the transport and reading of context about user, device identity and role, to create and enforce granular policy. The announcement is being made at the RSA Conference.

Cisco Systems has unveiled its distributed SecureX architecture, which enables "context aware" security enforcement regardless of infrastructure environment. A key element is inclusion of client information through Cisco's TrustSec technologies, which enable the transport and reading of context about user, device identity and role, to create and enforce granular policy. The announcement is being made at the RSA Conference.

"TrustSec tagging metadata provides contextual information that any firewall switch or router
can read," says Tom Gillis, VP and general manager for the Cisco Security Technology Business Unit. "Cisco draws context information from directories, Security Intelligence Operations [Cisco's threat assessment cloud service]), authentication information from clients, NAC products, and brings it all together."

SecureX includes:

  • A context aware policy language, introduced to manage enforcement, that is designed to be simple, defining policy in business terms;
  • Cisco AnyConnect VPN technology, which provides secure access from any device, including smartphone, PC or tablet; and
  • Virtual and cloud platforms that attach to Cisco virtual data center switching 
Cisco customers are mixed in their attitude toward use of personal mobile devices. "The cyber environment brings challenges," says Mauricio Guerra, director of global information services for Dow Chemical. "Businesses are asking for mobility, to enable business in a secure way."

"We go with a cautious approach," says Kevin DePeugh, executive director, assessment and response services, at Kaiser Permanente. "Our health care professionals want mobile devices; they can give care more efficiently, but we have to be careful about what we allow on network."

"There's a lot of pressure from our internal entrepreneurial group to be cool and sexy with dealers," says Andre Gold, head of technology operations and security at AutoTrader. "We identify use cases for employees rather than an approach of 'thou shalt not have personal devices.'"

Previous
1 of 2
Next
Comment  | 
Print  | 
More Insights
Slideshows
Cartoon
Audio Interviews
Archived Audio Interviews
Jeremy Schulman, founder of Schprockits, a network automation startup operating in stealth mode, joins us to explore whether networking professionals all need to learn programming in order to remain employed.
White Papers
Register for Network Computing Newsletters
Current Issue
2014 Private Cloud Survey
2014 Private Cloud Survey
Respondents are on a roll: 53% brought their private clouds from concept to production in less than one year, and 60% ­extend their clouds across multiple datacenters. But expertise is scarce, with 51% saying acquiring skilled employees is a roadblock.
Video
Twitter Feed