In large metropolitan areas, tourists are often easy to spot because they’re far more inclined than locals to gaze upward at the surrounding skyscrapers. Security experts say this same tourist dynamic is a dead giveaway in virtually all computer intrusions that lead to devastating attacks like data theft and ransomware, and that more organizations should set simple virtual tripwires that sound the alarm when authorized users and devices are spotted exhibiting this behavior.
In a blog post published last month, Cisco Talos said it was seeing a worrisome “increase in the rate of high-sophistication attacks on network infrastructure.” Cisco’s warning comes amid a flurry of successful data ransom and state-sponsored cyber espionage attacks targeting some of the most well-defended networks on the planet.
But despite their increasing complexity, a great many initial intrusions that lead to data theft could be nipped in the bud if more organizations started looking for the telltale signs of newly-arrived cybercriminals behaving like network tourists, Cisco says.
“One of the most important things to talk about here is that in each of the cases we’ve seen, the threat actors are taking the type of ‘first steps’ that someone who wants to understand (and control) your environment would take,” Cisco’s Hazel Burton wrote. “Examples we have observed include threat actors performing a ‘show config,’ ‘show interface,’ ‘show route,’ ‘show arp table’ and a ‘show CDP neighbor.’ All these actions supply the attackers a picture of a router’s perspective of the network, and an understanding of what foothold they have.”
Cisco’s alert concerned espionage attacks from China and Russia that abused vulnerabilities in aging, end-of-life network routers. But at a very important level, it doesn’t matter how or why the attackers got that initial foothold on your network.
It might be zero-day vulnerabilities in your network firewall or file-transfer appliance. Your more immediate and primary concern has to be: How quickly can you detect and detach that initial foothold?
The same tourist behavior that Cisco described attackers exhibiting vis-a-vis older routers is also incredibly common early on in ransomware and data ransom attacks — which often unfurl in secret over days or weeks as attackers methodically identify and compromise a victim’s key network assets.
These virtual hostage situations usually begin with the intruders purchasing access to the target’s network from dark web brokers who resell access to stolen credentials and compromised computers. As a result, when those stolen resources first get used by would-be data thieves, almost invariably the attackers will run a series of basic commands asking the local system to confirm exactly who and where they are on the victim’s network.
This fundamental reality about modern cyberattacks — that cybercriminals almost always orient themselves by “looking up” who and where they are upon entering a foreign network for the first time — forms the business model of an innovative security company called Thinkst, which gives away easy-to-use tripwires or “canaries” that can fire off an alert whenever all sorts of suspicious activity is witnessed.
“Many people have pointed out that there are a handful of commands that are overwhelmingly run by attackers on compromised hosts (and seldom ever by regular users/usage),” the Thinkst website explains. “Reliably alerting when a user on your code-sign server runs whoami.exe can mean the difference between catching a compromise in week-1 (before the attackers dig in) and learning about the attack on CNN.”
These canaries — or “canary tokens” — are meant to be embedded inside regular files, acting much like a web beacon or web bug that tracks when someone opens an email.
“Imagine doing that, but for file reads, database queries, process executions or patterns in log files,” the Canary Tokens documentation explains. “Canarytokens does all this and more, letting you implant traps in your production systems rather than setting up separate honeypots.”
Thinkst operates alongside a burgeoning industry offering so-called “deception” or “honeypot” services — those designed to confuse, disrupt and entangle network intruders. But in an interview with KrebsOnSecurity, Thinkst founder and CEO Haroon Meer said most deception techniques involve some degree of hubris.
“Meaning, you’ll have deception teams in your network playing spy versus spy with people trying to break in, and it becomes this whole counterintelligence thing,” Meer said. “Nobody really has time for that. Instead, we are saying literally the opposite: That you’ve probably got all these [security improvement] projects that are going to take forever. But while you’re doing all that, just drop these 10 canaries, because everything else is going to take a long time to do.”
The idea here is to lay traps in sensitive areas of your network or web applications where few authorized users should ever trod. Importantly, the canary tokens themselves are useless to an attacker. For example, that AWS canary token sure looks like the digital keys to your cloud, but the token itself offers no access. It’s just a lure for the bad guys, and you get an alert when and if it is ever touched.
One nice thing about canary tokens is that Thinkst gives them away for free. Head over to canarytokens.org, and choose from a drop-down menu of available tokens, including:
-a web bug / URL token, designed to alert when a particular URL is visited;
-a DNS token, which alerts when a hostname is requested;
-an AWS token, which alerts when a specific Amazon Web Services key is used;
-a “custom exe” token, to alert when a specific Windows executable file or DLL is run;
-a “sensitive command” token, to alert when a suspicious Windows command is run.
-a Microsoft Excel/Word token, which alerts when a specific Excel or Word file is accessed.
Much like a “wet paint” sign often encourages people to touch a freshly painted surface anyway, attackers often can’t help themselves when they enter a foreign network and stumble upon what appear to be key digital assets, Meer says.
“If an attacker lands on your server and finds a key to your cloud environment, it’s really hard for them not to try it once,” Meer said. “Also, when these sorts of actors do land in a network, they have to orient themselves, and while doing that they are going to trip canaries.”
Meer says canary tokens are as likely to trip up attackers as they are “red teams,” security experts hired or employed by companies seeking to continuously probe their own computer systems and networks for security weaknesses.
“The concept and use of canary tokens has made me very hesitant to use credentials gained during an engagement, versus finding alternative means to an end goal,” wrote Shubham Shah, a penetration tester and co-founder of the security firm Assetnote. “If the aim is to increase the time taken for attackers, canary tokens work well.”
Thinkst makes money by selling Canary Tools, which are honeypots that emulate full blown systems like Windows servers or IBM mainframes. They deploy in minutes and include a personalized, private Canarytoken server.
“If you’ve got a sophisticated defense team, you can start putting these things in really interesting places,” Meer said. “Everyone says their stuff is simple, but we obsess over it. It’s really got to be so simple that people can’t mess it up. And if it works, it’s the best bang for your security buck you’re going to get.”
Dark Reading: Credential Canaries Create Minefield for Attackers
NCC Group: Extending a Thinkst Canary to Become an Interactive Honeypot
Cruise Automation’s experience deploying canary tokens
Does setting the correct time on a router really matter? Actually, it does. In this edition of Cisco Routers and Switches, David Davis reviews the benefits of setting the correct time on your router, and he walks you through the three-step process to configure the correct time.
Last year, I wrote an article about why Cisco devices should
use Network Time Protocol (NTP) for their time synchronization needs, in which
I explained how to configure NTP on your Cisco devices (“Synchronize
a Cisco router’s clock with Network Time Protocol (NTP)”). Using NTP
is the ideal method for medium to large-scale networks.
However, if you have only a handful of routers, manually
setting the clock may be the easiest way to properly configure your devices’
times. Let’s walk through the process.
If a Cisco router boots up before you’ve configured a local
time or network time source, it will display the date as March 1, 1993. Here’s
Router> show clock *00:01:10.415 UTC Mon Mar 1 1993 Router>
This date’s appearance on log files is a good indication
that no one has set the router’s time source or local time. This is much more
likely than the router’s log entries actually dating back to 1993.
Does setting the correct time on a router really matter? While proper time
configuration isn’t necessary for a router to fully operate, that doesn’t mean
you shouldn’t set the right time. Here are some of the benefits of setting the
correct time on a router:
When setting a router’s (or switch’s) correct time, the
first step is configuring the proper time zone. This is the first step for a
reason: If you set the time first and then try to set to the time zone, you’ll
have to reset the time again.
The key point to remember is that it’s not enough to know that
you’re in the Eastern or Pacific time zone. You need to know how many hours you
are from Greenwich Mean Time (GMT).
For example, if you’re in the Eastern Standard Time zone in
the United States, you’re five hours behind GMT. You would indicate this to the
router with -5. If you’re unsure how many hours you are from GMT, the U.S.
Navy’s Web site offers a great resource—the World Time Zone Map.
After you’ve determined your time zone value, you can set
the time zone. For example, I live in the Central Standard Time (CST) zone, so
here’s how I would configure the router:
Router(config)# clock timezone CST -6
After setting the appropriate time zone, you need to
configure the router to adjust for Daylight Saving
Time. You can use the summer-time
command to accomplish this. Using our CST zone example, here’s how to configure
the router to use Daylight Saving Time:
Router(config)# clock summer-time CDT recurring
command tells the router to refer to Daylight Saving Time as Central Daylight Time
(CDT), which will automatically occur according to predefined dates and times on
the router. (You can use the same command to manually set the date and time for
Daylight Saving Time.) The recurring
option tells the router to use the accepted U.S. Daylight Saving Time rules for
the annual time changes in April and October.
After configuring the time zone and Daylight Saving Time, the
last step is to configure the router’s clock. You must do this while in Privileged
Mode—not Global Configuration Mode.
If you’ve never done this before, the format can be a bit
tricky. Here are some things to keep in mind:
Here’s an example:
Router# clock set 10:50:00 Oct 26 2006
After configuring the time zone, Daylight Saving Time, and
the clock, you can view the clock using the show
clock command. Here’s an example:
Router# show clock 10:51:33.208 CDT Thu Oct 19 2006 Router#
Keep in mind that most Cisco routers and switches don’t have
internal clocks that store the time when you power them off. That means rebooting
a device will lose the set local time. However, the time zone will remain set because
the router stores it in its configuration.
For more information on Cisco IOS time configuration, check
documentation for the various clock
commands. How do you set the time on routers or switches? Do you set it
manually or use NTP? What other router and switch subjects would you like to see covered?
Share your comments in this article’s discussion.
Check out the Cisco Routers and Switches
Archive, and catch up on David Davis’ most exact columns.
Want to learn more
about router and switch management? Automatically
sign up for our free Cisco Routers and Switches newsletter, delivered each
David Davis has worked
in the IT industry for 12 years and holds several certifications, including
CCIE, MCSE+I, CISSP, CCNA, CCDA, and CCNP. He currently manages a group of
systems/network administrators for a privately owned retail company and
performs networking/systems consulting on a part-time basis.
The modern world thrives on the internet, even if there are some bizarre unintended consequences from tying everything to an Ethernet cable or wireless signal. And as networks grow, the demand for people who know how to design, build, maintain, and protect them becomes even more important. The 2021 Cisco CCNA & CCNP Certification Training Bundle will get you the certifications you need to become a professional network engineer.
Both certifications were created by the networking company Cisco as they realized their products were becoming more complex, while educational materials weren't keeping up. For IT professionals, that's meant getting two key certifications, starting with the Cisco Certified Network Associate certification, or CCNA. Tied to the #200-301 exam, a CCNA certifies that you're able to set up, run, and maintain a network for a small or medium-sized business.
The first course in this bundle explores that in detail with 150 lectures across nearly 47 hours discussing routing protocols, WAN technology, device monitoring and management and security fundamentals. Whether you're new to IT or just want to update your skills, it's perfect for all levels.
Then the bundle turns to the Cisco Certified Network Professional certification, or CCNP. This expands on what you learned in the CCNA course to apply it to much larger networks, adding network architecture lessons, how to employ virtualization for users, and network infrastructure and assurance. Even if you're not going for your CCNP, it's information worth knowing for any IT professional or engineer who will deals with networks.
Courses are run by ITU Online Training, which has won a ton of industry awards, including honors at the Best in Biz Awards and the Cybersecurity Excellence Awards.
The demand for IT networking professionals is only growing, and a certification will help you move forward in your career, or launch a new one. The 2021 Cisco CCNA & CCNP Certification Training Bundle is normally $198, yet right now you can save 74% and get both courses for just $49.99.
Prices subject to change.
Futurism fans: To create this content, a non-editorial team worked with an affiliate partner. We may collect a small commission on items purchased through this page. This post does not necessarily reflect the views or the endorsement of the Futurism.com editorial staff.
To combat the ever-increasing virus threats, Cisco Systems® and Trend Micro have embarked on a joint initiative to offer the industry a higher level of protection against network threats and a higher class of service, in the form of real-time threat mitigation. Through this joint effort, Cisco® and Trend Micro bring a powerful new solution to security professionals: the Cisco Incident Control System (ICS). At the core of the Cisco ICS solution is the Cisco ICS server, software that acts as the administrative and delivery center and allows Cisco customers to deploy rapid-response mitigation policies to a large variety of Cisco network devices. Cisco ICS effectively and rapidly allows these network devices to mitigate and prevent newly discovered outbreak-related threats from entering the network.
The Cisco ICS solution's holistic approach and awareness of the network, coupled with TrendLabs' unparalleled threat expertise and response capabilities, make Cisco ICS a valuable addition to the Cisco Services for IPS service offering. Cisco ICS is uniquely effective at preventing virus threats from entering and propagating across the network, as well as eradicating them in the event of limited incursion. Cisco ICS provides the entire network with near-immediate awareness and response capabilities to new threats, allowing a Cisco infrastructure of devices to act as mitigation points more quickly than ever before.Click Here To Download:
Cisco Systems Inc. specializes in networking and communications products and services. The company is probably best known for its business routing and switching products, which direct data, voice, and video traffic across networks around the world. However, Cisco also offers storage networking, applications for unified communications, telepresence and collaboration (WebEx), and an array of services from simple product support to complete solutions for data centers and cloud management.
To ensure that IT professionals have the skills and knowledge necessary to support Cisco products and solve customers’ technology problems on many fronts, the Cisco Career Certification program is all-embracing. That is, it begins at the entry level, then advances to associate, professional, and expert levels, and (in some certification areas) caps things off at the architect level.
Each level offers one or more credentials. Obtaining a credential usually involves passing one or more certification exams. Most Cisco exams are delivered by Pearson VUE. For higher-level credentials, candidates must also prove they meet necessary prerequisites. The higher the level of certification, the more credentials and prerequisites one needs to meet those requirements.
Certifications within Cisco’s portfolio include the following credentials:
There are many certifications and paths one can take in Cisco’s career program. That said, its two main paths cover network operation and network design. A typical Cisco networking certification ladder begins with the entry-level CCENT credential, moves up to the CCNA, onto the CCNP and culminates with the CCIE. The design-oriented might instead consider starting with the CCENT, moving up to the CCDA, then the professional-level CCDP, followed by the CCDE, and finish the program with the CCAr.
The Cisco Career Certification program also includes a number of specializations. These certifications acknowledge a professional’s skills in a specific Cisco technology, such as data center application services, voicemail and messaging or rich media. Cisco specializations are organized into two primary categories: one targeting technical certified and another targeting digital transformation specialists. Between these two categories, there are currently 15 specializations among which IT pros can choose.
The Technical Specialist category includes specializations across six subcategories:
Digital Transformation certified includes credentials geared to Business Architecture and Customer Success.
Achieving a specialist credential generally requires passing one or two exams. Some credentials also impose prerequisites.
Entry-, associate- and professional-level credentials are valid for three years, CCIE and specialist certifications are valid for two years and the CCAr is valid for five years. To keep certifications current, Cisco professionals need to recertify by passing a recertification test or advancing to a higher level in Cisco’s certification hierarchy.
Cisco has two entry-level credentials: the Cisco Certified Entry Networking Technician (CCENT) and the Cisco Certified Technician (CCT). No prerequisites are needed to obtain either the CCENT or CCT credential, and candidates must pass a single test to earn each credential.
CCENT certified professionals install, maintain and troubleshoot small networks or a branch of an enterprise network, and implement basic network security. The CCENT credential is a prerequisite for some associate-level CCNA solution track credentials and the CCDA.
CCTs work onsite at customer locations, diagnosing issues and repairing or replacing network-related equipment. A CCT can choose one of several specialty tracks, which currently includes Data Center and Routing and Switching.
Certification Exams Number of Questions Time to Complete CCENT 100-105 ICND1 45-55 90 minutes CCT Data Center 010-151 DCTECH 65-75 90 minutes CCT Routing & Switching 640-692 RSTECH 60-70 90 minutes
Cisco’s associate-level certifications include the Cisco Certified Network Associate (CCNA) and the Cisco Certified Design Associate (CCDA). One must pass one or two certification exams to achieve a CCNA or CCDA credential, depending on the track you choose.
The CCNA recognizes basic skills in installing, supporting, and troubleshooting wired and/or wireless networks. One can choose from several tracks, including Cloud, Collaboration, Cyber Ops, Data Center, Industrial, Routing and Switching, Security, Service Provider and Wireless. The CCNA is a prerequisite for the professional-level CCNP certification. Prerequisites for the CCNA vary depending on the solution track chosen as do the number of required exams. All solution tracks require either one or two exams.
Cisco created the CCDA to identify individuals who can design basic wired and wireless networks, and incorporate security and voice solutions. The CCDA is a prerequisite for the CCDP certification. To obtain the CCDA, candidates must possess either a valid CCENT, CCNA Routing and Switching (or any CCIE certification), and pass a single additional exam.
|Certification||Exams||Number of Questions||Time to Complete|
|CCDA||200-310 DESGN||55-65||75 minutes|
|CCNA Cloud||210-451 CLDFND||55-65||90 minutes|
|210-455 CLDADM||55-65||90 minutes|
|CCNA Collaboration||210-060 CICD||55-65||75 minutes|
|210-065 CIVND||55-65||75 minutes|
|CCNA Cyber Ops||210-250 SECFND||55-60||90 minutes|
|210-255 SECOPS||60-70||90 minutes|
|CCNA Data Center||200-150 DCICN||55-65||90 minutes|
|200-155 DCICT||65-75||120 minutes|
|CCNA Industrial||200-601 IMINS2||65-75||90 minutes|
|CCNA Routing and Switching**||200-125 CCNA||60-70||90 minutes|
|100-105 ICND1||45-55||90 minutes|
|200-105 ICND2||55-65||90 minutes|
|CCNA Security||210-260 IINS||60-70||90 minutes|
|CCNA Service Provider||640-875 SPNGN1||65-75||90 minutes|
|640-878 SPNGN2||65-75||90 minutes|
|CCNA Wireless||200-355 WIFUND||60-70||90 minutes|
**Candidates for the CCNA Routing and Switching may take test 200-125 OR test 100-105 plus 200-105.
Cisco’s professional-level credentials include two main programs: the Cisco Certified Network Professional (CCNP) and the Cisco Certified Design Professional (CCDP). To obtain the CCDP, one must pass three certification exams and possess both the CCDA and CCNA Routing and Switching credentials or any Cisco CCIE or CCDE certification.
All CCNP solution tracks, except Routing and Switching, require candidates to pass four exams. Only three exams are required for the CCNP: Routing and Switching credential. Prerequisites for all CCNP solution tracks include either the lower-level CCNA credential or any CCIE credential. The CCNP: Service Provider credential also accepts the Cisco Certified Internet Professional (CCIP) credential as a prerequisite (which retired in 2012).
The CCNP credential recognizes professionals who plan, deploy, and troubleshoot local networks and wide area networks. The CCNP tracks are the same as those for the CCNA, except for Industrial and Cyber Ops, which are not offered in the CCNP track. The CCNP is recommended to climb up to the next step on the cert ladder – the Cisco Certified Internetwork Expert.
The CCDP identifies proficiency in designing and deploying scalable networks and multilayer-switched networks. From the CCDP, you can move on to the Cisco Certified Design Expert.
|Certification||Exams||Number of Questions||Time to Complete|
|CCDP||300-101 ROUTE||45-65||120 minutes|
|300-115 SWITCH||30-40||120 minutes|
|300-320 ARCH||60-70||75 minutes|
|CCNP Cloud||300-460 CLDINF||55-65||90 minutes|
|300-465 CLDDES||55-65||90 minutes|
|300-470 CLDAUT||55-65||90 minutes|
|300-475 CLDACI||55-65||90 minutes|
|CCNP Collaboration||300-070 CIPTV1||65-75||75 minutes|
|300-075 CIPTV2||50-60||75 minutes|
|300-080 CTCOLLAB||55-65||75 minutes|
|300-085 CAPPS||55-65||75 minutes|
|CCNP Data Center**||300-175 DCUCI||55-65||90 minutes|
|300-165 DCII||55-65||90 minutes|
|300-170 DCVAI||55-65||90 minutes|
|300-160 DCID||55-65||90 minutes|
|300-180 DCIT||70-80||90 minutes|
|CCNP Routing and Switching||300-101 ROUTE||45-65||120 minutes|
|300-115 SWITCH||30-40||120 minutes|
|300-135 TSHOOT||15-25||120 minutes|
|CCNP Security||300-208 SISAS||55-65||90 minutes|
|300-206 SENSS||65-75||90 minutes|
|300-209 SIMOS||65-75||90 minutes|
|300-210 SITCS||65-75||90 minutes|
|CCNP Service Provider||642-883 SPROUTE||65-75||90 minutes|
|642-885 SPADVROUTE||65-75||90 minutes|
|642-887 SPCORE||65-75||90 minutes|
|642-889 SPEDGE||65-75||90 minutes|
|CCNP Wireless||300-360 WIDESIGN||55-65||90 minutes|
|300-365 WIDEPLOY||55-65||90 minutes|
|300-370 WITSHOOT||55-65||90 minutes|
|300-375 WISECURE||55-65||90 minutes|
**CCNP Data Center may take either the 300-160 or 300-180 exam.
Cisco’s expert-level credentials embrace two primary certifications: the coveted Cisco Certified Internetwork Expert (CCIE) and the Cisco Certified Design Expert (CCDE). Neither certification imposes prerequisites, but one must pass a written test and a rigorous practical test to earn either of these credentials.
Beginning in July 2016, Cisco updated its expert-level exams to include an evolving technologies domain. This new domain targets cloud, network programmability and the IoT, and it accounts for 10 percent of the total test score. Cisco may change the subjects included in this domain to reflect emerging technologies as they reach strong enough commercial interest, potential and presence to make them examworthy. The company describes this mechanism as a way to help future-proof its certifications so that employers may assume that those who hold current credentials are also up to speed on important new networking technologies.
For many network-track professionals, achieving the CCIE is the highlight of their careers. A CCIE has expert technical skills and knowledge of Cisco network products and solutions in one of the CCIE technical tracks, which currently include Collaboration, Data Center, Routing and Switching, Security, Service Provider, and Wireless.
The CCDE identifies experts who design infrastructure solutions for large enterprise environments, which include technological, operational, business and budget aspects of a project.
For persons seeking positions such as network architect or data center architect, a smart move is to acquire the Cisco Certified Architect (CCAr) certification. The CCAr is like the Ph.D. of the Cisco Career Certification program – it’s the highest level of certification that Cisco offers. This credential validates the skills of a senior network infrastructure architect, someone who can plan and design IT infrastructures based on business strategies. Many people consider the CCAr the most difficult tech certification to achieve.
To earn the CCDE certification, you must design a network solution to implement an assigned strategy; then, you must appear before a Cisco-appointed panel to explain and defend that solution.
Cisco maintains a comprehensive list of training and self-study resources. These resources include various forms of online learning, practice exams, learning labs, links to which appear on each certification’s web page. The Cisco Learning Network offers candidates a free basic membership that includes access to test topics, live seminars, IT training videos, study groups, forums, study materials and much more. The subscription-based Cisco Platinum Learning Library provides professionals with on-demand learning and access to more than 400 courses, hands-on vLabs, the support library, and more. Additional training materials are also available from Cisco Press.
Cisco Live 2023 promises a re-imagined IT experience complete with new innovations in networking, security and collaboration, to name a few, as the tech giant continues its journey toward building top tech platforms for MSPs and end customers.
Bookmark this page for the latest news and exclusive interviews with top executives and channel partners.
Partners Applaud Cisco’s Sustainability Focus With Data Center, Webex Control Hub Updates
‘Everyone has a sustainability goal, but it’s very hard to actually measure and track and figure out what my improvements actually did in terms of environmental impact. Cisco has done a pretty good job of turning that into a dashboard through Control Hub,’ says Joe Berger, area vice president of digital experiences at Cisco Gold partner World Wide Technology.
Cisco Channel Chief Tuszik On Networking Cloud, FSO, And How Generative AI Can Help Partners Grow Their Businesses
“When you look at the Cisco Live announcements; if it’s Networking Cloud, the security piece, what we’re doing with Webex or FSO, they all are offers, rather, solutions that we bring into the market that are ready to be delivered in a managed-as-a-service motion,” Cisco Channel leader Oliver Tuszik told CRN.
Cisco Injects Generative AI Into Security, Collaboration Portfolios For ‘Reimagined’ Customer Experiences
‘We were going to be investing very heavily in this notion of AI just being part of the fabric of everything … One of the big challenges we have in our industry is shortage of skill and talent, and we can make sure that every single person can become this very sophisticated user when they start using our products,’ Cisco’s EVP of Security and Collaboration Jeetu Patel tells CRN.
Cisco Webex Go With AT&T Addresses Cloud Calling For Mobility-Minded Partners
The tech giant has teamed with AT&T to help more businesses move to the cloud for their calling needs, while unlocking new mobility opportunities for partners, the company announced at Cisco Live 2023.
Cisco Live 2023: Cisco ELT’s 5 Big Statements
CEO Chuck Robbins, alongside the tech giant’s executive leadership team, talk about Cisco’s AI, networking and security launches, as well as the biggest trends happening in the IT industry on-stage at Cisco Live 2023.
Cisco Security Cloud Platform Now Includes SSE, Multi-Cloud Feature, Firewall Updates
‘When you have 70 players on average that are part of the security stack, that’s 70 different policy engines and 70 different cracks in the system. The efficacy of companies is going down when they buy point solutions and so what our customers are telling us is [they] need an integrated platform,’ Cisco’s Jeetu Patel tells CRN.
Cisco Builds On Security Platform Strategy, Unveils Unified Networking Platform
Following in the footsteps of its Security Cloud platform, the tech giant debuts its Cisco Networking Cloud strategy at Cisco Live 2023 to the delight of channel partners.
Cisco Accelerates Platform Push With New Full Stack Observability Platform
‘Cisco is using the term full stack observability and they mean it. Full stack creates a platform, which means, essentially, an ecosystem of observability and monitoring, and very few players have anything close to that,’ Cisco Gold partner NTT tells CRN.
This copy is for your personal, non-commercial use only. To order presentation-ready copies for distribution to your colleagues, clients or customers visit http://www.djreprints.com.
Stocks: Real-time U.S. stock quotes reflect trades reported through Nasdaq only; comprehensive quotes and volume reflect trading in all markets and are delayed at least 15 minutes. International stock quotes are delayed as per exchange requirements. Fundamental company data and analyst estimates provided by FactSet. Copyright 2019© FactSet Research Systems Inc. All rights reserved. Source: FactSet
Indexes: Index quotes may be real-time or delayed as per exchange requirements; refer to time stamps for information on any delays. Source: FactSet
Markets Diary: Data on U.S. Overview page represent trading in all U.S. markets and updates until 8 p.m. See Closing Diaries table for 4 p.m. closing data. Sources: FactSet, Dow Jones
Stock Movers: Gainers, decliners and most actives market activity tables are a combination of NYSE, Nasdaq, NYSE American and NYSE Arca listings. Sources: FactSet, Dow Jones
ETF Movers: Includes ETFs & ETNs with volume of at least 50,000. Sources: FactSet, Dow Jones
Bonds: Bond quotes are updated in real-time. Sources: FactSet, Tullett Prebon
Currencies: Currency quotes are updated in real-time. Sources: FactSet, Tullett Prebon
Commodities & Futures: Futures prices are delayed at least 10 minutes as per exchange requirements. Change value during the period between open outcry settle and the commencement of the next day's trading is calculated as the difference between the last trade and the prior day's settle. Change value during other periods is calculated as the difference between the last trade and the most exact settle. Source: FactSet
Data are provided 'as is' for informational purposes only and are not intended for trading purposes. FactSet (a) does not make any express or implied warranties of any kind regarding the data, including, without limitation, any warranty of merchantability or fitness for a particular purpose or use; and (b) shall not be liable for any errors, incompleteness, interruption or delay, action taken in reliance on any data, or for any damages resulting therefrom. Data may be intentionally delayed pursuant to provider requirements.
Mutual Funds & ETFs: All of the mutual fund and ETF information contained in this display, with the exception of the current price and price history, was supplied by Lipper, A Refinitiv Company, subject to the following: Copyright 2019© Refinitiv. All rights reserved. Any copying, republication or redistribution of Lipper content, including by caching, framing or similar means, is expressly prohibited without the prior written consent of Lipper. Lipper shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.
Cryptocurrencies: Cryptocurrency quotes are updated in real-time. Sources: CoinDesk (Bitcoin), Kraken (all other cryptocurrencies)
Calendars and Economy: 'Actual' numbers are added to the table after economic reports are released. Source: Kantar Media