Cisco Systems, Inc. - Experts & Thought Leaders

Latest Cisco Systems, Inc. news & announcements

Cisco XDR enhancements boost AI-powered security

Cisco has made several transformative innovation and partnership announcements that will help security professionals secure and harness the power of AI. An increasingly sophisticated threat landscape combined with an expanding talent shortage means the need has never been greater for machine scale security and response. According to Cisco’s upcoming 2025 Cybersecurity Readiness Index, companies worldwide underestimate the complexities of securing AI, with 86% saying their organisations have experienced AI-related security incidents in the past 12 months. Dynamic cybersecurity threat landscape Cisco’s announcements further its commitment to developing these capabilities Cisco’s announcements further its commitment to developing these capabilities for customers through ecosystem partnerships and for the broader community through open-source security models and tooling. “The cybersecurity threat landscape has never been more dynamic and complex, with adversaries constantly emboldened and enabled by AI to drive new attacks and exploits,” said Jeetu Patel, Executive Vice President and Chief Product Officer at Cisco, adding, “To fight back, understaffed security operations and IT leaders need AI power of their own.” He continues, “Cisco is continuing its mission to secure AI and leverage AI for security with novel open-source models and tools, new AI agents, and IoT advancements, alongside the full breadth of the Cisco Security Cloud. Together, these innovations will help level the playing field and deliver AI innovation that makes all businesses more secure.” Improved Threat Detection and Response with Cisco XDR Security teams are inundated with thousands of threat alerts daily. Cisco XDR addresses this challenge by correlating telemetry across network, endpoint, cloud, email, and more, using agentic AI to surface what matters most to organisations. Integrating several new features, Cisco XDR will deliver decisive, AI-powered responses to stop attacks faster than ever. The new Instant Attack Verification integrates data from the Splunk platform, endpoints, networks, threat intelligence, and more – and uses agentic AI to automatically create and execute tailored investigation plans. This feature swiftly investigates, confirms threats, and enables security teams to automate responses with confidence to stop attacks. New automated XDR Forensics capabilities New automated XDR Forensics capabilities provide deeper visibility into endpoint activity New automated XDR Forensics capabilities provide deeper visibility into endpoint activity, increasing the accuracy of investigations. Additionally, a new XDR Storyboard clearly visualises complex attacks, empowering security teams to understand threats in seconds and decisively respond faster. To further help organisations strengthen their digital resilience - Splunk Enterprise Security (ES) and Splunk SOAR 6.4 enhance defences against known and unknown threats for better visibility, accurate detections, and integrated and automated workflows that increase efficiency. Organisations that combine Splunk ES and SOAR with Cisco XDR will gain enhanced network visibility and detection to expedite investigations and stay ahead of threats. With this breadth of solutions, Cisco helps organisations build a SOC of the future that harnesses agentic AI to identify threats faster, accelerate resolutions, and realise massive productivity gains. Splunk SOAR 6.4 is generally available, and Splunk Enterprise Security 8.1 will be available in June. Cisco XDR changes security services delivery “Cisco XDR has fundamentally changed how we deliver security services, and we're eager to leverage the enhancements in our vision for the future,” said Omar Zarabi, CEO, Port53, adding “Building on its network-centric and open XDR approach, the emphasis on clarity, decisiveness, and speed – delivered through Instant Attack Verification powered by agentic AI, and automated XDR Forensics – will further streamline our operations and deliver even better results for our customers.” “Cisco XDR aims to address key challenges in the SOC with its focus on 'Clear Verdict. Decisive Action. AI Speed,'” said Frank Dickson, Group Vice President, Security & Trust, IDC, adding “The combination of Instant Attack Verification, XDR Storyboard visualisations, and automated XDR Forensics offers a streamlined approach to threat management. The effectiveness of these features in improving security outcomes will depend on real-world deployment and integration within existing security ecosystems.” Security for AI and AI for Security Cisco continues its commitment to help customers tackle the growing challenges of managing AI security risks Building on the recent launch of AI Defense, Cisco is continuing its commitment to help customers tackle the growing challenges of managing AI security risks. Cisco announced a new integration as part of a deepened relationship with ServiceNow to enable confident and secure AI adoption at scale. The first integration will bring together Cisco AI Defense with ServiceNow SecOps to provide more holistic AI risk management and governance. Cisco introduces Foundation AI Cisco also introduced Foundation AI, a team of renowned AI and security experts that joined through the Robust Intelligence acquisition, focused on developing cutting-edge technology to address the fundamental security issues of the AI era. The Foundation AI team has released the first open-source reasoning model built specifically for enhancing security applications. They will also debut novel benchmarks to evaluate cyber security models on real-world security use cases, plus additional tools and building blocks for teams to leverage in adapting the models. These models and tools will encourage collaboration among first-class security experts and machine learning engineers, while delivering essential infrastructure that cyber security teams can immediately leverage. AI Supply Chain Risk Management security controls New set of AI Supply Chain Risk Management security controls will help customers to secure AI application artifacts Additionally, a new set of AI Supply Chain Risk Management security controls will help customers to secure AI application artifacts. Even before deploying models in production, enterprises are exposed to security vulnerabilities, like malware in AI model files and poisoned data sets that are downloadable from open-source repositories. By combining AI model threat assessment and detection with comprehensive network enforcement, enterprises can confidently accelerate their AI adoption and innovation. This includes identifying and blocking malicious AI model files, before they enter the enterprise; automatically detecting and blocking AI model files with risky or restrictive open-source software licenses that pose intellectual property and compliance risks; and flagging and enforcing policies against AI models originating from prohibited suppliers. Enhanced Industrial IoT Security Solutions As industry digitisation accelerates and industrial AI emerges, critical infrastructure and industrial networks are constantly exposed to cyber threats. Enhancing the Cisco Industrial Threat Defense solution and further extending IT security to industrial settings, these new integrations with Cisco Cyber Vision include: Cisco Vulnerability Management and Splunk Asset and Risk Intelligence to help prioritise OT cyber risks; Cisco Secure Firewall to help automate industrial network segmentation to better protect operations; and the Splunk OT Security add-on in Splunk ES to unify IT and OT visibility within the SOC, helping detect threats traversing domains to secure global enterprises.

DigiCert achieves record Q4 with 104% NNACV target

DigiCert, Inc., one of the global provider of digital trust, announces a record-breaking Q4 for FY2025, closing at 104% of target net new annual contract value (NNACV), 25% higher than the largest NNACV quarter in the company’s history. The company exceeded expectations for the second half of the fiscal year, fueled by demand for quantum-ready security solutions and an integrated digital trust platform that unifies PKI and authoritative DNS into a single offering.  “Our record results highlight the increasing need for digital trust in a rapidly evolving security landscape,” said Amit Sinha, CEO of DigiCert. “Organisations worldwide are embracing our DigiCert ONE platform to centralise and simplify digital trust management. By securing the entire digital footprint—from authentication and encryption to DNS—our solutions help enterprises reduce risk, eliminate outages, and improve operational efficiency.”  Between January 2024 and February 2025, DigiCert saw a 67% increase in the number of customers who purchased both a certificate and at least one DigiCert ONE solution, demonstrating the rising demand for an integrated, end-to-end digital trust platform.  Notable business landmarks for FY2025 As part of its growth strategy, DigiCert completed its acquisition of Vercara In FY2025, DigiCert delivered significant business milestones and product innovation, reinforcing its leadership in digital trust. The company closed a record-breaking fourth quarter at 104% of target NNACV, the largest in its history, and exceeded expectations for the second half of the year, closing at 102% of the total ACV plan. As part of its growth strategy, DigiCert completed its acquisition of Vercara, expanding its digital trust capabilities to include UltraDNS and strengthening its ability to provide comprehensive security solutions to enterprises worldwide. DigiCert strengthened its executive team with key appointments, including Chief Trust Officer Lakshmi Hanspal and Chief Marketing Officer Atri Chatterjee. The company also welcomed Dr. Taher Elgamal, the widely recognised “father of SSL,” as a strategic advisor. World quantum readiness day Further reinforcing its leadership in advancing digital trust and quantum readiness, DigiCert hosted the inaugural World Quantum Readiness Day, a global initiative aimed at raising awareness and accelerating action toward post-quantum preparedness. The event attracted nearly 4,000 registrants and featured industry luminaries, including Dr. Peter Shor, Dr. Taher Elgamal, Dr. Bob Sutor, and experts from Google, Accenture, Deloitte, IBM, Cisco, and NIST. DigiCert advanced its technology leadership in FY2025 through continued innovation and investment in future-ready solutions, such as the newly-launched DigiCert ONE platform. The company filed 81 new patent applications during the year, including nine for AI/ML-specific technologies, 10 focused on post-quantum cryptography, and four advancing content authentication. Upcoming products and innovation DigiCert introduced DigiCert® Device Trust Manager, a comprehensive, lifecycle-based IoT security solution DigiCert introduced DigiCert® Device Trust Manager, a comprehensive, lifecycle-based IoT security solution that enables device manufacturers to secure connected devices at scale—from production through decommissioning. As the number of connected devices is projected to reach 56 Billion, Device Trust Manager addresses the growing complexity of compliance, data integrity, and operational risk by delivering end-to-end visibility, automated provisioning, and real-time monitoring. Additionally, DigiCert began offering Common Mark Certificates (CMCs) to address the increasing need for verifiable indicators of online trust. These globally recognised digital trust marks help organisations demonstrate compliance, build consumer confidence, and protect brand integrity. DigiCert is currently the only provider in the market to offer both Common Mark Certificates and Verified Mark Certificates, underscoring its leadership in shaping the future of digital trust.

Colt and Cisco's 800G route: Future of networking

Colt Technology Services, the digital infrastructure company, announced that it is first to successfully trial Cisco’s 800G ZR+ coherent pluggable optics in its production network using the Cisco 8000 series routers, powered by Cisco Silicon One. The Routed Optical Networking testing– carried out across the 667 km between Frankfurt and Munich, Germany– is the latest in a series of Colt trials with high-profile global partners designed to rethink technology’s previous limitations as businesses require efficient, low latency, future-ready networking technology for AI, machine learning, API integration and other digital applications. Cisco’s 800G ZR+ coherent optics The trial demonstrates that Cisco’s 800G ZR+ coherent optics can double Colt’s packet core capacity per link The trial showcased how high-performance, energy-efficient networking technology can support businesses on their net zero journey. It demonstrated that the network can handle incredibly high data rates of 800 Gbps –  transferring 1 Terabyte of data in just eleven seconds - and can be flexible in allocating bandwidth where it’s needed most, significantly improving overall efficiency and performance. The trial demonstrates that Cisco’s 800G ZR+ coherent optics can double Colt’s packet core capacity per link (800G) while reducing power consumption by 33.3%. Applications based on AI workloads As Colt integrates the Cisco 800G ZR+ coherent optics and Cisco 8000 routers across its infrastructure from mid-2025, it will offer better, faster, cost-effective services to its customers through its award-winning NaaS platform while contributing to its own goals for carbon reduction. Colt was an early pioneer of Routed Optical Networking, which brings advantages to businesses located in densely populated metropolitan areas alongside core/aggregation and datacentre interconnect applications based on AI workloads. Routed Optical Networking converges the IP and optical layers into a single, unified layer using high-capacity digital coherent optics to boost efficiency and reduce costs. Innovative methods Businesses benefit from cost savings through power reduction and network consolidation Businesses benefit from cost savings through power reduction and network consolidation; simplification and automation, with easier network management; and capacity optimisation, improving the performance of their network traffic and significantly reducing energy and rack space. Buddy Bayer, chief operating officer of Colt Technology Services, said, “At Colt, we’re ‘sustainable by design,’ pioneering innovative methods to embed sustainability throughout our entire business. Our collaboration with Cisco to trial the cutting-edge 800G ZR+ technology is a perfect example of this effort, as we work together to create the ultimate high-performance, efficient, scalable network of the future.” Colt’s latest Digital Infrastructure Report Multi-vendor interoperability is named as a barrier to achieving environmental impact goals and governance goals by one in five CIOs, in Colt’s latest Digital Infrastructure Report. The Cisco 800G ZR+ coherent pluggable enables interoperability capabilities between partners, using technology designed to maximise performance and reduce power consumption. Cisco was the first to deliver the 800G ZR+ coherent pluggable optics with the OpenROADM specification which includes interoperable PCS, allowing the seamless connection of devices and other hardware across digital infrastructure ready for workloads such as AI. Future demands of AI and machine learning Colt and Cisco have a long track record of uniting to study new technologies that drive clients’ success Bill Gartner, SVP/GM Cisco Optical Systems and Optics, said: “Modernising infrastructure to be ready for the future demands of AI and machine learning is critical. This groundbreaking trial with Colt highlights Cisco’s blazing-fast data rates using Cisco’s 800G ZR+ coherent pluggable optics and Cisco 8000 series routers powered by Silicon One. This will enable Colt to deliver cutting-edge network innovation that not only boosts efficiency and performance but also helps drive significant cost savings and stride confidently towards their net zero goals.” Colt and Cisco have a long track record of collaborating to explore new technologies that drive customers’ success and accelerate automation, including Cisco Routed Optical Networking; Cisco Provider Connectivity Assurance; Cisco Crosswork Network Automation; and Cisco Silicon One.   Technical details The trial utilised the following technologies: Cisco 800G ZR+ coherent pluggable optics with Interoperable PCS as defined in OpenROADM for enhanced performance Cisco 8711 and 8212 Cisco Silicon One-based platforms Third-party line system Interoperable PCS transmission modules Colt is the first to field trial 800G ZR+ coherent modules with Interoperable PCS in Cisco Routers PCS is a transmission shaping technique that provides additional link performance beyond traditional transmission modes such as 16QAM. Industry standardisation of an interoperable PCS transmission shaping function, once relegated to proprietary performance-optimised transponder platforms, including those for submarine applications, is a tremendous leap forward in the progress of MSA pluggable module capabilities. Colt is the first to field trial 800G ZR+ coherent modules with Interoperable Probabilistic Constellation Shaping (PCS) in Cisco Routers. Latest 800G Routed Optical Networking trial Buddy added, “At Colt, we’re the largest pan-European network aggregation provider, and we bring together best-in-class access and a self-service, consumption-based NaaS for our customers." "The latest 800G Routed Optical Networking trial means we can support our customers’ data transmission rates up to 400Gbps, enhancing speed, flexibility, and cost-efficiency for customers across Europe.” Pluggable optics are small, modular devices that can be inserted into network equipment like routers and switches to convert electrical signals into optical signals and vice versa. These modules, often referred to as transceivers, are essential for enabling high-speed data transmission over fibre optic cables. In comparison with Colt’s previous 400G ZR+ build. Leveraging 800G coherent technology with the Cisco 8000 powered by Silicon One, Colt can significantly scale up capacity while minimising power and rack space requirements per terabit, supporting sustainable services. Trialing an 800G router doesn’t necessarily mean that individual connections can achieve 800Gbps speeds; the capacity is distributed across the network and shared among multiple users and services rather than a single user achieving 800Gbps. The network is designed to balance and allocate bandwidth efficiently based on demand.

Insights & Opinions from thought leaders at Cisco Systems, Inc.

What will changes to data privacy legislation mean for security and surveillance companies?

In the UK there is a new data reform act working its way through the legislative process. As the law changes, the market changes – so this year will see many companies trying to read the tea leaves and adapt their offerings to take advantage of the emerging changes. The security marketplace is, apparently, constrained by the need for great privacy – it appears to be a zero-sum game – you can have privacy, or you can have security, you can’t have both. In the second half of the year, it is likely that more firms will require services which enable the use of video analytics to extract operational value from visual data, while using AI-powered tools to protect privacy as standard. Privacy-enhancing technologies One of the areas where there is a huge interest is among retailers, who use video cameras not only to reduce shrinkage and protect employees, but also for video analytics (to understand customer behaviour). Several other industries such as transport, retail, and healthcare have also had an increased rollout One area which is extremely interesting and very poorly understood is the extent to which these videos troves are protected under GDPR. The short answer is they are protected, and the second half of 2022 will see more retailers adopting privacy-enhancing technologies to allow them to open up their security footage to help optimise operations and marketing. There will undoubtedly be a rise in live video capture for safety and accountability. Seven US states now mandate body-worn cameras for police officers, and they are also common practice with UK police. Several other industries such as transport, retail, and healthcare have also had an increased rollout. CCTV camera operators In parallel, both public and private organisations are turning more towards video analytics, as they can be useful in many different contexts; they can help in saving time for CCTV camera operators, help efficiency in monitoring places for crime, and can be integrated into other systems – i.e., counting footfall at different locations – as well as use for smart parking, automatic licence plate recognition, and facial recognition. 2022 will bring further growth in consumers investing in personal video surveillance for their homes. With the pandemic having forced many to stay at home, home security has become more of a priority. Ring, which produces doorbell cameras, is increasingly popular: they are now the largest corporate-owned civilian-installed surveillance network in the U.S. Personal security cameras Countries like China have already incorporated heavy use of facial recognition technology Interestingly, some of the first GDPR cases and fines have arisen surrounding these cameras, with questions surrounding lawfully processing data and invasion of privacy. As a result, we could see more of a legal requirement for individuals to process footage from their personal security cameras in compliance with GDPR. While the privacy and human rights issues surrounding facial recognition remain heavily discussed, its use will become a lot more ubiquitous – but with concurrent pushes for regulation. Countries like China have already incorporated heavy use of facial recognition technology, and in the West, particularly in smart cities, it is being adopted in different areas; namely, in airports, retail stores, hospitals, and in the workplace, as well as verifying identities online. Trialling facial recognition The police in the UK have also been trialling facial recognition AI for ‘predictive policing’ to tackle crime and use these video analytics for intelligence gathering. In the second half of the year, the EU will reach resolution on its new AI Act that looks to ban facial recognition for a range of sectors. The EU will reach resolution on its new AI Act that looks to ban facial recognition for a range of sectors Companies’ attitudes toward privacy are shifting. Attitudes towards security methods for securing data are changing, with it no longer being a simple check-box exercise, but important for brand reputation and marketing purposes. Investing more money and effort into securing data privacy, as well as weighing out the benefits of data localisation, will become more commonplace for businesses when trying to keep customer data secure. Managing personal data Cyber-attack will continue to be one the largest risk for data management, alongside data misuse from employees. Recent statistics from CISCO have shown that over 50% of consumers would switch to companies they believe have better policies around the handling of data. Consumers are wanting greater trust and transparency from the businesses they engage with, leading to companies changing the way that their internal and external practices deal with and manage personal data. Privacy is no longer about compliance and more to do with business reputation and trust – and customers and employees are becoming more cognisant of this. The author of this article is Simon Randall, CEO of Pimloc, the video privacy, and security company.

Finding the right integrator for enterprise organisations

Enterprise security directors often count on an integration firm to handle jobs ranging from day-to-day activities to long-term, technology-laden projects. However, before entering a relationship, you must know what's reasonable to expect from an integrator – as not all are created equal. Here are some tips that might make the selection process easier. Completing comprehensive classwork An integrator's experience working in an enterprise environment is an obvious consideration. Ideally, that experience fits well with your business. Any enterprise experience is a plus, but local, state, and federal regulations create precise yet very different rules for securing a utility instead of a hospital. That's also true for university campuses, manufacturing facilities, and many other operations. Many manufacturers offer certifications awarded after completing comprehensive classwork and testing Look for certifications indicative of an integrator's commitment to staying on top of industry changes. Organisations such as ASIS International and the Security Industry Association offer certifications showing an integrator's team members have mastered security principles and skills. Many manufacturers offer certifications awarded after completing comprehensive classwork and testing. Also, ensure an integrator sells and services equipment that integrates with your current security systems. Using multiple systems for the same function is less efficient. Project update meetings Go beyond an integrator's slick brochures and websites to ask tough questions about previous experience. How would the integrator handle a hypothetical situation in one of your facilities? Ask the integrator if there will be one project manager for all jobs. And ensure that person handles all interactions with security subcontractors. Ask if the integrator provides regularly scheduled project update meetings. It's frustrating to wonder how your project is progressing. Ask if the integrator's team can work during the hours and days that result in the least interference to your daily operations. Ask for onsite system training to save time and eliminate travel costs. Gathering sensitive data Look for an integrator with proven experience working with an enterprise IT department A malfunctioning component may be more than an inconvenience – it may be a severe security threat. You need to know how quickly your integrator can respond when things go wrong. Ask about available service plans. And consider the embedded staff approach in which the integrator places employees on your site full time to handle day-to-day and emergency activities. Much of the security equipment – video, access control, intercoms, visitor management, and more – is wireless and dependent upon networks operated by your IT department. Network-based devices provide more opportunities for hackers to gather sensitive data or cause critical equipment to malfunction. Don't trust your security operations with an Integrator unfamiliar with at least basic cybersecurity principles. Look for an integrator with proven experience working with an enterprise IT department. At a minimum, ensure the integrator can set and change security device IP addresses and port locations. Certifications from providers such as Cisco, Microsoft, and IBM indicate an understanding of various IT technologies. Potential security partners Knowledgeable integrators work with the well-encrypted Open Supervised Data Protocol (OSDP), now an internationally recognised standard. Run from any integrator who suggests operating an access control system with used Wiegand technology offering no encryption between cards and readers. It's easy for hackers to capture data and clone a working credential. Technology moves at a rapid pace. Your modern system of a few years ago may be long-of-tooth. You need an integrator capable of bringing new and innovative ideas to the table. You want an integrator who conducts in-house testing of new products, not relying solely on a manufacturer's claims. You want an integrator capable of thinking outside the box to solve a complex security problem. These ideas are just a start in assessing an integrator's value to your enterprise operation. However, they will help you sort through potential security partners to find one that best meets your needs.

What are the challenges and benefits of mobile access control?

There is a broad appeal to the idea of using a smartphone or wearable device as a credential for physical access control systems. Smartphones already perform a range of tasks that extend beyond making a phone call. Shouldn’t opening the door at a workplace be among them? It’s a simple idea, but there are obstacles for the industry to get there from here. We asked this week’s Expert Panel Roundtable: What are the challenges and benefits of mobile access control solutions? 

Quick poll
Which trend do you think will define physical security in the next 5 years?