Cisco Systems, Inc.- Experts & Thought Leaders
Latest Cisco Systems, Inc. news & announcements
Colt Technology Services, the digital infrastructure company, announced that it is first to successfully trial Cisco’s 800G ZR+ coherent pluggable optics in its production network using the Cisco 8000 series routers, powered by Cisco Silicon One. The Routed Optical Networking testing– carried out across the 667 km between Frankfurt and Munich, Germany– is the latest in a series of Colt trials with high-profile global partners designed to rethink technology’s previous limitations as businesses require efficient, low latency, future-ready networking technology for AI, machine learning, API integration and other digital applications. Cisco’s 800G ZR+ coherent optics The trial demonstrates that Cisco’s 800G ZR+ coherent optics can double Colt’s packet core capacity per link The trial showcased how high-performance, energy-efficient networking technology can support businesses on their net zero journey. It demonstrated that the network can handle incredibly high data rates of 800 Gbps – transferring 1 Terabyte of data in just eleven seconds - and can be flexible in allocating bandwidth where it’s needed most, significantly improving overall efficiency and performance. The trial demonstrates that Cisco’s 800G ZR+ coherent optics can double Colt’s packet core capacity per link (800G) while reducing power consumption by 33.3%. Applications based on AI workloads As Colt integrates the Cisco 800G ZR+ coherent optics and Cisco 8000 routers across its infrastructure from mid-2025, it will offer better, faster, cost-effective services to its customers through its award-winning NaaS platform while contributing to its own goals for carbon reduction. Colt was an early pioneer of Routed Optical Networking, which brings advantages to businesses located in densely populated metropolitan areas alongside core/aggregation and datacentre interconnect applications based on AI workloads. Routed Optical Networking converges the IP and optical layers into a single, unified layer using high-capacity digital coherent optics to boost efficiency and reduce costs. Innovative methods Businesses benefit from cost savings through power reduction and network consolidation Businesses benefit from cost savings through power reduction and network consolidation; simplification and automation, with easier network management; and capacity optimisation, improving the performance of their network traffic and significantly reducing energy and rack space. Buddy Bayer, chief operating officer of Colt Technology Services, said, “At Colt, we’re ‘sustainable by design,’ pioneering innovative methods to embed sustainability throughout our entire business. Our collaboration with Cisco to trial the cutting-edge 800G ZR+ technology is a perfect example of this effort, as we work together to create the ultimate high-performance, efficient, scalable network of the future.” Colt’s latest Digital Infrastructure Report Multi-vendor interoperability is named as a barrier to achieving environmental impact goals and governance goals by one in five CIOs, in Colt’s latest Digital Infrastructure Report. The Cisco 800G ZR+ coherent pluggable enables interoperability capabilities between partners, using technology designed to maximise performance and reduce power consumption. Cisco was the first to deliver the 800G ZR+ coherent pluggable optics with the OpenROADM specification which includes interoperable PCS, allowing the seamless connection of devices and other hardware across digital infrastructure ready for workloads such as AI. Future demands of AI and machine learning Colt and Cisco have a long track record of uniting to study new technologies that drive clients’ success Bill Gartner, SVP/GM Cisco Optical Systems and Optics, said: “Modernising infrastructure to be ready for the future demands of AI and machine learning is critical. This groundbreaking trial with Colt highlights Cisco’s blazing-fast data rates using Cisco’s 800G ZR+ coherent pluggable optics and Cisco 8000 series routers powered by Silicon One. This will enable Colt to deliver cutting-edge network innovation that not only boosts efficiency and performance but also helps drive significant cost savings and stride confidently towards their net zero goals.” Colt and Cisco have a long track record of collaborating to explore new technologies that drive customers’ success and accelerate automation, including Cisco Routed Optical Networking; Cisco Provider Connectivity Assurance; Cisco Crosswork Network Automation; and Cisco Silicon One. Technical details The trial utilised the following technologies: Cisco 800G ZR+ coherent pluggable optics with Interoperable PCS as defined in OpenROADM for enhanced performance Cisco 8711 and 8212 Cisco Silicon One-based platforms Third-party line system Interoperable PCS transmission modules Colt is the first to field trial 800G ZR+ coherent modules with Interoperable PCS in Cisco Routers PCS is a transmission shaping technique that provides additional link performance beyond traditional transmission modes such as 16QAM. Industry standardisation of an interoperable PCS transmission shaping function, once relegated to proprietary performance-optimised transponder platforms, including those for submarine applications, is a tremendous leap forward in the progress of MSA pluggable module capabilities. Colt is the first to field trial 800G ZR+ coherent modules with Interoperable Probabilistic Constellation Shaping (PCS) in Cisco Routers. Latest 800G Routed Optical Networking trial Buddy added, “At Colt, we’re the largest pan-European network aggregation provider, and we bring together best-in-class access and a self-service, consumption-based NaaS for our customers." "The latest 800G Routed Optical Networking trial means we can support our customers’ data transmission rates up to 400Gbps, enhancing speed, flexibility, and cost-efficiency for customers across Europe.” Pluggable optics are small, modular devices that can be inserted into network equipment like routers and switches to convert electrical signals into optical signals and vice versa. These modules, often referred to as transceivers, are essential for enabling high-speed data transmission over fibre optic cables. In comparison with Colt’s previous 400G ZR+ build. Leveraging 800G coherent technology with the Cisco 8000 powered by Silicon One, Colt can significantly scale up capacity while minimising power and rack space requirements per terabit, supporting sustainable services. Trialing an 800G router doesn’t necessarily mean that individual connections can achieve 800Gbps speeds; the capacity is distributed across the network and shared among multiple users and services rather than a single user achieving 800Gbps. The network is designed to balance and allocate bandwidth efficiently based on demand.
Cyware, the pioneering provider of threat intelligence management, low-code/no-code automation, and cyber fusion solutions, announced the appointment of Jawahar Sivasankaran as President, marking a pivotal step in Cyware’s mission to empower organisations with advanced threat intelligence and security solutions. Jawahar brings 25+ years of experience fostering security product innovation, growth leadership, and customer success at Cisco, Splunk, and Appgate. Prior roles of Jawahar Most recently, as President and COO of Appgate, Jawahar led all go-to-market functions, including sales, marketing, and customer success, and served as a Section 16 public company officer. Previously at Splunk, Jawahar played a key leadership role in transforming specialisation sales for Splunk’s advanced security offerings, driving growth and customer intimacy. Before that, he held various leadership positions in go-to-market and product functions at Cisco. Cyware’s AI efforts Jawahar is active in the startup ecosystem as an investor and advisor focused on scale-up activities Over the past year, he has served as an advisor to pioneering consulting and private equity firms, including with Advent International as an Industry Operating Advisor. Jawahar is active in the startup ecosystem as an investor and advisor focused on scale-up activities. “Jawahar’s leadership and extensive experience in scaling security platform companies will be instrumental in driving our growth and strengthening our brand,” said Anuj Goel, CEO of Cyware. “Cyware is setting the standard for threat-driven, collaborative cybersecurity, and we look forward to the impact he will have in aligning our teams and delivering unmatched value to our customers. Jawahar’s latest focus on AI for improving security operations outcomes will be instrumental in evolving Cyware’s AI efforts.” Innovative cybersecurity “Joining Cyware, a true pioneer in cybersecurity, is an exciting opportunity to contribute to a visionary pioneer in threat intelligence, collective defence, and automated response," said Jawahar Sivasankaran, Cyware's President. “With a powerful vision and a strong team in place, Cyware is uniquely positioned to deliver meaningful solutions that truly prioritise customer outcomes. Together with our go-to-market teams, we will accelerate growth, deepen customer relationships, and help modernise cybersecurity through innovation and collaboration.” With this appointment, Cyware reaffirms its commitment to innovative cybersecurity and customer-centered solutions, positioning itself for accelerated growth and industry leadership.
Ahead of the Black Hat MEA in Riyadh from 26-28 November 2024, Cisco, the worldwide pioneer in networking and security, released insights into key cybersecurity trends that emerged between July and September 2024. The findings are based on analysis from Cisco Talos, one of the most trusted threat intelligence research teams globally, highlighting a notable increase in identity-based and ransomware attacks. Identity-based attacks Over the three-month period, there was a noticeable rise in identity-based attacks, particularly with a focus on stealing credentials, which accounted for 25% of incident response engagements. These types of attacks have become easier to execute, often using readily available tools. Ransomware incidents also remained a significant concern, making up nearly 40% of engagements. New ransomware variants, including RansomHub, RCRU64, and DragonForce, were observed this quarter, alongside familiar variants like BlackByte and Cerber. Innovations in cybersecurity Cisco is highlighting how it powers and protects the engine of the AI process – AI-ready data centres Organisations in the education, manufacturing, and financial services verticals were most affected this quarter, accounting for over 30% of compromises. This trend aligns with what was observed in previous quarters in 2024. Cisco is participating as a Strategic Sponsor at Black Hat MEA 2024 under the theme “Innovating a New Era of Security,” showcasing its latest innovations in cybersecurity. This year, Cisco is highlighting how it powers and protects the engine of the AI revolution – AI-ready data centres and clouds – to make every application and device secure no matter how they are distributed or connected. Advanced security solutions Salman Faqeeh, Managing Director, Cisco Saudi Arabia, commented: "The mounting trends in identity-based attacks and ransomware highlight the evolving nature of cyber threats. At Cisco, we are committed to supporting our customers in strengthening their digital resilience with advanced security solutions." He adds, "Black Hat MEA continues to be a significant platform for us to share latest threat insights and showcase our innovations that prevent identity-based attacks; detect and stop breaches; and close the exploit gap." Cisco's commitment Additionally, Splunk, a Cisco company, will showcase its innovations at the same booth, demonstrating solutions that support the future of Security Operations Centres (SOC), as well as specialised solutions for Operational Technology (OT) environments. As part of Cisco’s program of events at Black Hat MEA, Lothar Renner, Managing Director, Cisco Security, EMEA, will deliver a keynote address on “Redefining Security in the Age of AI,” emphasising Cisco's commitment to innovation and security in an increasingly complex threat environment. Cisco will be present at booth H1-T20 at the Riyadh Exhibition & Conference Centre in Malham from 26-28 November 2024.
Insights & Opinions from thought leaders at Cisco Systems, Inc.
In the UK there is a new data reform act working its way through the legislative process. As the law changes, the market changes – so this year will see many companies trying to read the tea leaves and adapt their offerings to take advantage of the emerging changes. The security marketplace is, apparently, constrained by the need for great privacy – it appears to be a zero-sum game – you can have privacy, or you can have security, you can’t have both. In the second half of the year, it is likely that more firms will require services which enable the use of video analytics to extract operational value from visual data, while using AI-powered tools to protect privacy as standard. Privacy-enhancing technologies One of the areas where there is a huge interest is among retailers, who use video cameras not only to reduce shrinkage and protect employees, but also for video analytics (to understand customer behaviour). Several other industries such as transport, retail, and healthcare have also had an increased rollout One area which is extremely interesting and very poorly understood is the extent to which these videos troves are protected under GDPR. The short answer is they are protected, and the second half of 2022 will see more retailers adopting privacy-enhancing technologies to allow them to open up their security footage to help optimise operations and marketing. There will undoubtedly be a rise in live video capture for safety and accountability. Seven US states now mandate body-worn cameras for police officers, and they are also common practice with UK police. Several other industries such as transport, retail, and healthcare have also had an increased rollout. CCTV camera operators In parallel, both public and private organisations are turning more towards video analytics, as they can be useful in many different contexts; they can help in saving time for CCTV camera operators, help efficiency in monitoring places for crime, and can be integrated into other systems – i.e., counting footfall at different locations – as well as use for smart parking, automatic licence plate recognition, and facial recognition. 2022 will bring further growth in consumers investing in personal video surveillance for their homes. With the pandemic having forced many to stay at home, home security has become more of a priority. Ring, which produces doorbell cameras, is increasingly popular: they are now the largest corporate-owned civilian-installed surveillance network in the U.S. Personal security cameras Countries like China have already incorporated heavy use of facial recognition technology Interestingly, some of the first GDPR cases and fines have arisen surrounding these cameras, with questions surrounding lawfully processing data and invasion of privacy. As a result, we could see more of a legal requirement for individuals to process footage from their personal security cameras in compliance with GDPR. While the privacy and human rights issues surrounding facial recognition remain heavily discussed, its use will become a lot more ubiquitous – but with concurrent pushes for regulation. Countries like China have already incorporated heavy use of facial recognition technology, and in the West, particularly in smart cities, it is being adopted in different areas; namely, in airports, retail stores, hospitals, and in the workplace, as well as verifying identities online. Trialling facial recognition The police in the UK have also been trialling facial recognition AI for ‘predictive policing’ to tackle crime and use these video analytics for intelligence gathering. In the second half of the year, the EU will reach resolution on its new AI Act that looks to ban facial recognition for a range of sectors. The EU will reach resolution on its new AI Act that looks to ban facial recognition for a range of sectors Companies’ attitudes toward privacy are shifting. Attitudes towards security methods for securing data are changing, with it no longer being a simple check-box exercise, but important for brand reputation and marketing purposes. Investing more money and effort into securing data privacy, as well as weighing out the benefits of data localisation, will become more commonplace for businesses when trying to keep customer data secure. Managing personal data Cyber-attack will continue to be one the largest risk for data management, alongside data misuse from employees. Recent statistics from CISCO have shown that over 50% of consumers would switch to companies they believe have better policies around the handling of data. Consumers are wanting greater trust and transparency from the businesses they engage with, leading to companies changing the way that their internal and external practices deal with and manage personal data. Privacy is no longer about compliance and more to do with business reputation and trust – and customers and employees are becoming more cognisant of this. The author of this article is Simon Randall, CEO of Pimloc, the video privacy, and security company.
Enterprise security directors often count on an integration firm to handle jobs ranging from day-to-day activities to long-term, technology-laden projects. However, before entering a relationship, you must know what's reasonable to expect from an integrator – as not all are created equal. Here are some tips that might make the selection process easier. Completing comprehensive classwork An integrator's experience working in an enterprise environment is an obvious consideration. Ideally, that experience fits well with your business. Any enterprise experience is a plus, but local, state, and federal regulations create precise yet very different rules for securing a utility instead of a hospital. That's also true for university campuses, manufacturing facilities, and many other operations. Many manufacturers offer certifications awarded after completing comprehensive classwork and testing Look for certifications indicative of an integrator's commitment to staying on top of industry changes. Organisations such as ASIS International and the Security Industry Association offer certifications showing an integrator's team members have mastered security principles and skills. Many manufacturers offer certifications awarded after completing comprehensive classwork and testing. Also, ensure an integrator sells and services equipment that integrates with your current security systems. Using multiple systems for the same function is less efficient. Project update meetings Go beyond an integrator's slick brochures and websites to ask tough questions about previous experience. How would the integrator handle a hypothetical situation in one of your facilities? Ask the integrator if there will be one project manager for all jobs. And ensure that person handles all interactions with security subcontractors. Ask if the integrator provides regularly scheduled project update meetings. It's frustrating to wonder how your project is progressing. Ask if the integrator's team can work during the hours and days that result in the least interference to your daily operations. Ask for onsite system training to save time and eliminate travel costs. Gathering sensitive data Look for an integrator with proven experience working with an enterprise IT department A malfunctioning component may be more than an inconvenience – it may be a severe security threat. You need to know how quickly your integrator can respond when things go wrong. Ask about available service plans. And consider the embedded staff approach in which the integrator places employees on your site full time to handle day-to-day and emergency activities. Much of the security equipment – video, access control, intercoms, visitor management, and more – is wireless and dependent upon networks operated by your IT department. Network-based devices provide more opportunities for hackers to gather sensitive data or cause critical equipment to malfunction. Don't trust your security operations with an Integrator unfamiliar with at least basic cybersecurity principles. Look for an integrator with proven experience working with an enterprise IT department. At a minimum, ensure the integrator can set and change security device IP addresses and port locations. Certifications from providers such as Cisco, Microsoft, and IBM indicate an understanding of various IT technologies. Potential security partners Knowledgeable integrators work with the well-encrypted Open Supervised Data Protocol (OSDP), now an internationally recognised standard. Run from any integrator who suggests operating an access control system with used Wiegand technology offering no encryption between cards and readers. It's easy for hackers to capture data and clone a working credential. Technology moves at a rapid pace. Your modern system of a few years ago may be long-of-tooth. You need an integrator capable of bringing new and innovative ideas to the table. You want an integrator who conducts in-house testing of new products, not relying solely on a manufacturer's claims. You want an integrator capable of thinking outside the box to solve a complex security problem. These ideas are just a start in assessing an integrator's value to your enterprise operation. However, they will help you sort through potential security partners to find one that best meets your needs.
There is a broad appeal to the idea of using a smartphone or wearable device as a credential for physical access control systems. Smartphones already perform a range of tasks that extend beyond making a phone call. Shouldn’t opening the door at a workplace be among them? It’s a simple idea, but there are obstacles for the industry to get there from here. We asked this week’s Expert Panel Roundtable: What are the challenges and benefits of mobile access control solutions?
Palm vein recognition
DownloadThe key to unlocking K12 school safety grants
Download5 surprising findings from OT vulnerability assessments
DownloadHoneywell GARD USB threat report 2024
DownloadSelecting the right network video recorder (NVR) for any vertical market
Download