<$BlogRSDUrl$>
 

This page is powered by Blogger. Isn't yours?

 Feedblitz email:
 RSS: http://linkingintegrity.blogspot.com/atom.xml

 

linking INTEGRITY

Integrity - use of values or principles to guide action in the situation at hand.

Below are links and discussion related to the values of freedom, hope, trust, privacy, responsibility, safety, and well-being, within business and government situations arising in the areas of security, privacy, technology, corporate governance, sustainability, and CSR.

The case for self-defending networks, 17.2.05

SearchSecurity @ RSA 2005

Chambers' keynote summarized

Chambers said companies can no longer afford to run on a loose patchwork of standalone devices; that everything must be tightly integrated.

'Whatever you do must be largely automated and self-defending,' Chambers said. 'You can't rely on human intervention. Architecture is vital... security must go across every device in the network and be part of your business process. You must be able to watch for patterns and abnormalities. You must be able to audit behavior.'

He said enterprises need networks that can easily adapt to rapidly evolving threats in the next decade. 'You have to look at the trends of the next decade and plan for it,' Chambers said. 'We all understand the trend -- security incidents are getting worse. You can't predict when and where things will happen, so you'll have to understand the how.'

Chambers predicts a rapid integration of technology in the next decade. 'Everything will be connected,' he said. 'You'll see a consolidation of data and voice companies...voice technology will be commoditized, you'll see more consolidation of telecommunication companies.' With that will come new threats, he added.

The latest phase of Cisco's Self-Defending Network initiative, Adaptive Threat Defense (ATD), was formed with those trends in mind, he said. It's designed to help enterprises minimize network risks by "dynamically addressing threats at multiple layers, enabling tighter control of network traffic, endpoints, users and applications," according to a company statement. Key components of ATD include better coordinated threat mitigation through Anti-X defenses, application security, and network control and containment.

Anti-X defenses prevent and mitigate network threats through a combination of traffic and content-oriented security services, Cisco said. Core security enforcement technologies include firewall, intrusion prevention, anomaly detection and distributed denial-of-service mitigation fused with application-inspection services like network antivirus, antispyware and URL filtering.

Application security provides advanced business-application protection using application-level access controls, application inspection, and enforcement of appropriate application-use policies, Web-application control, and transaction privacy, the company said.

Network control and containment provides the ability to layer sophisticated auditing and correlation capabilities to "control and help protect" any networked element or service such as Voice over IP (VoIP) with active management and mitigation capabilities, the company added.

A full list of Cisco's new security products is available.


Comments

Post a Comment

 

Google

Integrity Incorporated

Site Feed

 Feedblitz email:


 RSS: http://linkingintegrity.blogspot.com/atom.xml


"We shall need compromises in the days ahead, to be sure. But these will be, or should be, compromises of issues, not principles. We can compromise our political positions, but not ourselves. We can resolve the clash of interests without conceding our ideals. And even the necessity for the right kind of compromise does not eliminate the need for those idealists and reformers who keep our compromises moving ahead, who prevent all political situations from meeting the description supplied by Shaw: "smirched with compromise, rotted with opportunism, mildewed by expedience, stretched out of shape with wirepulling and putrefied with permeation.
Compromise need not mean cowardice. .."

John Fitzgerald Kennedy, "Profiles in Courage"

Archives

07.03   08.03   09.03   10.03   11.03   12.03   01.04   02.04   03.04   04.04   05.04   06.04   07.04   08.04   09.04   10.04   11.04   12.04   01.05   02.05   03.05   04.05   05.05   06.05   07.05   08.05   09.05   10.05   11.05   12.05   01.06   02.06   03.06   04.06   05.06   06.06   08.06   09.06   10.06   11.06   01.07   02.07   03.07   04.07   07.07   08.07   09.07   10.07   05.08   06.08