SlideShare a Scribd company logo
1 of 13
Download to read offline
2018 Global Network Access Control
Market Leadership Award
2018
BEST PRACTICES RESEARCH
© Frost & Sullivan 2018 2 “We Accelerate Growth”
Contents
Background and Company Performance ........................................................................3
Industry Challenges..............................................................................................3
Market Leadership of Cisco ....................................................................................4
Conclusion...........................................................................................................9
Significance of Market Leadership...............................................................................10
Understanding Market Leadership...............................................................................10
Key Performance Criteria ..........................................................................................11
Best Practices Recognition: 10 Steps to Researching, Identifying, and Recognizing Best
Practices .................................................................................................................12
The Intersection between 360-Degree Research and Best Practices Awards.....................13
Research Methodology ........................................................................................13
About Frost & Sullivan ..............................................................................................13
BEST PRACTICES RESEARCH
© Frost & Sullivan 2018 3 “We Accelerate Growth”
Background and Company Performance
Industry Challenges
Network visibility of endpoints is critical. Every device on a network is a potential attack or
reconnaissance point that must be discovered and secured. Organizations are faced with
the increasing level of malware and cyber attacks. The enterprise network no longer sits
within four secure walls. It extends to wherever employees and data travel. Mobility,
digitization, and the Internet of Things (IoT) are changing the way we live and work. The
result is that networks are expanding, resulting in increasing complexity of managing
resources and disparate security solutions.
Network access control (NAC) is a foundational network security defense. NAC is about
connecting trusted users with trusted network services. The majority of NAC deployments
use the 802.1X protocol, an IEEE 802.1X open-standard protocol for port-based secure
access. More advanced NAC solutions have gone well beyond stand AAA (authentication,
authority and accounting) to enable rich user and device visibility for more streamlined,
flexible, and secure services. Secure access also requires policy and access control for
scalable segmentation in today's highly distributed networks.
IoT and mobility trends present potential threat vectors that organizations need to
manage. According to Frost & Sullivan, there will be 45.4 billion connected devices by
2023. Most of these will be IoT devices. The high growth of IoT presents risk to enterprise
networks since most organizations don't have full visibility and comprehensive secure
access applied to all users and devices. It is not only the volume of devices but also the
diversity of OS’s and devices that poses a challenge. Most IoT devices lack the resources
for embedding an agent, thus agentless technology is required. As the volume of device
diversity increases, the ability of an organization to see and control devices declines. This
makes NAC's capabilities more relevant than ever.
Organizations need to develop visibility across the enterprise: campus, data center,
private cloud, public cloud and Operational Technology (OT) networks. Other protocols in
addition to 802.1X need to be supported. Organizations face challenges as IT and OT
converge. For example, OT networks were isolated silos, but are now morphing into the
Industrial Internet of Things (IIoT). OT networks are no longer physically separated from
IT networks. Threats are moving between cyber and physical dimensions. Most OT devices
are difficult to patch.
Organizations are migrating workloads to the cloud, both public and private. Support is
needed for AWS, Azure and other cloud computing platforms. Network administrators
must deal with multiple device locations and access points. It is a heterogeneous
environment with multiple vendors and management is typically decentralized.
While NAC is a powerful security tool, it is a very complex technology that can be difficult
to implement. Unlike the earlier generation of NAC, which was intrusive and restrictive,
BEST PRACTICES RESEARCH
© Frost & Sullivan 2018 4 “We Accelerate Growth”
NAC vendors must focus on easing deployment and management, and providing IT
complete visibility into every endpoint on their networks.
The complexities of NAC deployment and management can be a factor of a) the
customer's tendency to use multiple security solutions that are not integrated and
orchestrated and b) the severe shortage of skilled professional security experts to manage
them. More than 25% of organizations use anywhere between 11-20 security vendors and
16% of organizations have been found to use anywhere between 20-50. Leveraging a
multitude of security vendors that are not integrated and orchestrated can produce a
significant volume of security alerts that can be overwhelming for any limited security
staff to manage.
Organizations are in need of a security system that automates, integrates and
orchestrates with other security solutions such as Next Generation Fire Wall (NGFW),
Security Information and Event Management (SIEM), and threat intelligence networks in
order to increase NAC efficacy and justify its investment.
NAC is a fast growing market. In 2017, revenues grew 23.7% to $942.3 million. Frost &
Sullivan projects a compound annual growth rate from 2017 to 2022 of 16.9%. While the
high growth rate and size of the NAC market has attracted more than 12 vendors in the
last few years, establishing a leadership position in such a competitive market is
challenging both incumbent and new vendors in NAC.
Market Leadership of Cisco
The NAC market is dominated by Enterprise and Large Enterprise customers,
organizations with 2,500 or more employees. This is Cisco’s primary customer base. Cisco
Identity Services Engine (ISE) is the leading vendor in the NAC market. It holds 34.3%
market share (see graph) and has held that top spot for several years. Cisco ISE has over
29,000 customers, representing virtually every industry and a majority of the Fortune
500. Cisco is the dominant NAC player in Enterprise and Large Enterprise segments. It
also dominates every vertical market and geographic region.
Cisco is able to effectively serve these large organizations by integrating ISE within its
broad security portfolio and leadership position in networking equipment and services.
Cisco is the largest enterprise and security vendor by revenue and is well established with
large organizations.
Cisco ISE is an integrated, open, and scalable solution that provides visibility, technology
integration, automation, and granular policy control from a user and their device, and
devices without users right to a resource or application. It's comprised of applications,
services, and network controller features.
ISE works closely with other Cisco technologies such as Talos (threat intelligence
organization), StealthWatch and Advanced Malware Protection (AMP). Cisco has focused
BEST PRACTICES RESEARCH
© Frost & Sullivan 2018 5 “We Accelerate Growth”
on growing its third-party ecosystem and partnerships. ISE 2.4 extends Cisco's focus on
providing device profiling and visibility into the emerging industrial IoT market, especially
in Manufacturing and Healthcare. Additionally, ISE has been incorporated into the Cisco
Software-Defined Access solution, which is an architecture highly reliant on scalable policy
services for what the industries terms "intent-based networking".
In the company’s 2017 annual report, Cisco states, “We believe that security is the top IT
priority for many of our customers. Our security strategy is focused on delivering a unified
threat-centric security architecture combining network, cloud and endpoint-based
solutions. Through this approach, we intend to provide security across the entire attack
continuum before, during, and after a cyberattack to help our customers shorten the time
between threat detection and response.” Cisco’s NAC solution is an integral part of its
overall integrated security strategy.
Cisco’s total security segment grew 9.3% in fiscal 2017, compared to total corporate
revenue drop of 4.2%. Frost & Sullivan estimates that Cisco NAC had revenues of $323
million in calendar 2017, growing 13.9% over 2016. Thus, NAC is a growth driver for
Cisco’s fast growing security segment.
BEST PRACTICES RESEARCH
© Frost & Sullivan 2018 6 “We Accelerate Growth”
Growth Strategy Excellence
Cisco has a broad customer base in the NAC market covering virtually every industry.
Cisco ISE is comprehensive, scalable and can be geared to the needs of a specific
industry.
With clear,role-based segmentation Cisco has been consistently solving challenges for
customers in the Financial Services industry. Cisco ISE also expands into IoT use cases
with an increased interest from the OT industry. The company has success with customers
in the Manufacturing and Healthcare industries with its Industrial Network Director and
Medical NAC product offerings. Cisco partners with clinics, hospitals and medical
equipment manufacturers to develop a holistic solution that not only identifies medical
devices such as a blood pressure monitor, but also helps define policies on the level of
access provided to the device on the network. Cisco has a proven solution for PCI
compliance to serve the Retail market. Cisco group-based policy standards has
dramatically simplified PCI compliance.
Cisco leverages its security portfolio and networking equipment to grow its NAC offering.
Through pxGrid, Cisco ISE is integrated with more than 100 security partners and
orchestrated with other security solutions, both Cisco’s and other security vendors.
Most of Cisco’s ISE revenues are currently derived from physical appliance sales.
However, the company is focusing on developing innovations for virtual appliance, cloud
services and IoT. The company has made further investments in IoT, BYOD and
segmentation.
Cisco continues to innovate ISE through internal development as well as key acquisitions.
Some of these acquisitions are technologies that are used across its security portfolio. For
example:
• Duo Security (August 2, 2018 - announced intent to aqcuire) - helps defend
organizations against data breaches by making security easy and effective
• Skyport Systems (January 24, 2018) - provides cloud-managed, hyper-converged
systems that run and protect business-critical applications.
• Perspica, Inc. (October 19, 2017) - provides machine learning and data processing
technology and expertise.
• Observable Networks, Inc. (July 13, 2017) - technology is based on dynamic
behavioral modeling of all devices on the network. Cisco is using this technology to
extend its Stealthwatch solution into the cloud with highly scalable behavior
analytics and comprehensive visibility.
BEST PRACTICES RESEARCH
© Frost & Sullivan 2018 7 “We Accelerate Growth”
• Viptela Inc. (May 1, 2017) - provides a compelling software-defined wide area
network (SD-WAN) solution that simplifies management. The cloud-first approach
also aligns with Cisco's Digital Network Architecture (DNA) transition to software-
driven, automated networks that are more flexible, responsive and dynamic.
• ContainerX, Inc. (August 30, 2016) - technology to help enterprises manage,
orchestrate and integrate containers across data centers.
• Jasper Technologies, Inc. (February 3, 2016) – the industry’s leading IoT service
platform in terms of number of enterprises and service providers.
Product Quality
Cisco’s ISE architecture goes beyond the traditional Authentication, Authorization and
Accounting (AAA). Cisco ISE offers a broad and comprehensive range of features which it
continues to expand. Cisco offers scalability ranging from small sites to millions of users.
For example, the upper limit of Cisco’s ISE deployments is upward of 500,000 concurrent
endpoints, scalable to 1.5 million endpoints. ISE offers the ability to profile and obtain the
contextual identity of any device that connects to the network. Cisco provides profiles for
specific verticals, such as Healthcare and Manufacturing. It offers authentication methods
for both passive and active identity. The Cisco physical appliance node deployment
architecture provides redundancy. Cisco continues to develop threat-centric NAC
enhancements with its growing intelligence ecosystem, TALOS. The ISE pxGrid partner
ecosystem is growing.
Customers invest in Cisco ISE for several reasons:
• The company offers a comprehensive solution from endpoint to an application in
the data center.
• ISE addresses numerous secure access use cases and integrates across a vast set
of security and networking solutions.
• Superior visibility, through device profiling and device-profile feed service, reduces
the number of unknown endpoints.
• Cisco’s market-leading AnyConnect, with over 120 million endpoints, provides
visibility.
• ISE is the policy controller for Software-defined Access that allows for extremely
granular segmentation options.
Through integration, open systems, and native features, ISE enables extensive
automation that makes it less human-resource intensive to provide secure services and
easier for workers to access the services they require from anywhere. ISE represents
BEST PRACTICES RESEARCH
© Frost & Sullivan 2018 8 “We Accelerate Growth”
numerous integrated technologies with the flexibility to craft services for virtually any size
or type of operation, regardless of industry or size.
Implementation Excellence
Deploying and implementing a NAC solution can be a daunting task for many customers.
The shortage of security professionals makes it difficult for organizations to have the
necessary expertise.
ISE provides customers with a Secure Access Wizard (SAW). This tool enables
configuration of all necessary settings plus basic customization of Guest, BYOD and Secure
Access (802.1X) flows. The tool configures ISE and the Wireless Controller in a matter of
minutes. Simplifying the deployment of its NAC Solution is an ongoing development.
Cisco ISE provides a centralized dashboard that provides comprehensive monitoring,
customizable reporting, and alarms for all of its native functions. Cisco drives industry
standards through its commitment to delivering a simple, open and automated security
architecture. The company offers out of the box simplicity for guest administration and
onboarding, BYOD, and secure access. Technical support is available from both internal
customer service and highly-trained and certified partners.
Cisco touts its high scalability which allows organizations to use fewer NAC appliances and
scale to 1,500,000 total and 500,000 concurrent endpoints and devices. ISE is vendor-
neutral in its support for access control and segmentation with market-leading
technologies. Cisco’s pxGrid enables integration with virtually any security intelligence
technology.
Brand Strength
Cisco ISE is the NAC market leader with more deployments than any other vendor and is
trusted to deliver, support, and continuously improve its solution to meet current and
future access control and security requirements. Cisco leverages its well-known and broad
security portfolio integrating ISE with Cisco's AMP, CTA, Stealthwatch and Firepower next
generation firewall and intrusion prevention technologies.
Unlike competitors who offer point solutions, ISE benefits from being a centerpiece of a
comprehensive security strategy framework that covers the campus, network, data center
and cloud. It is well established with large organizations. Cisco offers engineering,
network design and maintenance, and professional services for enterprises.
Strategic Partnerships
Cisco ISE integrates with over 100 ecosystem partners to provide an all-encompassing
NAC solution. The company has an extensive network of highly trained partners on ISE.
ISE has a broad integration partner ecosystem covering 50+ partner product integrations
BEST PRACTICES RESEARCH
© Frost & Sullivan 2018 9 “We Accelerate Growth”
in 14 distinct technology areas. ISE can send and receive context from ecosystem
partners to make better secure network access policy decisions. The ISE pxGrid has over
100 partner integrations and is growing.
Cisco recently announced a partnership with McAfee. Cisco pxGrid integrates with the
McAfee OpenDXL security fabric. This interoperability delivers unprecedented breadth in
multi-vendor collaboration and simplifies security vendor integration for customers. The
integration helps respective threat response ecosystem partners collaborate through ISE
and McAfee ePO. The result is a combined threat response partner community of more
than 100 security vendors along with contributions from an open source community.
Conclusion
NAC is a mature product category but vendors need to innovate to meet the changing
needs of the market. The NAC market is evolving as enterprise networks expand beyond
the traditional secure walls. NAC vendors must contend with the emerging trends of IoT,
mobility, BYOD, IT and OT convergence, and cloud usage. Security orchestration and
integration with other security solutions is an important NAC function. Cisco has a broad
security product portfolio, but also works with other security vendors to increase NAC
efficacy.
Cisco is addressing the specific needs of its customers in all vertical markets with an open
and flexible NAC architecture. Cisco ISE is a comprehensive and scalable solution with a
wide set of features and functions. The company is investing in Software-defined Access
for intent-based networking. In addition to its internal technology development, Cisco is
making strategic acquisitions for technologies that will enhance all of its security products.
It is leveraging these improvements into ISE. Cisco is driving widespread adoption of ISE
with its growing partner ecosystem.
With its strong overall performance, Cisco has achieved a leadership position in the NAC
market with a market share of 34.3%, and Frost & Sullivan is proud to bestow the 2018
Market Leadership Award to Cisco.
BEST PRACTICES RESEARCH
© Frost & Sullivan 2018 10 “We Accelerate Growth”
Significance of Market Leadership
Ultimately, growth in any organization depends upon customers purchasing from a
company, and then making the decision to return time and again. Loyal customers
become brand advocates; brand advocates recruit new customers; the company grows;
and then it attains market leadership. To achieve and maintain market leadership, an
organization must strive to be best-in-class in three key areas: understanding demand,
nurturing the brand, and differentiating from the competition. This three-fold approach to
delivering market leadership is explored further below.
Understanding Market Leadership
As discussed on the previous page, driving demand, strengthening the brand, and
differentiating from the competition all play a critical role in a company’s path to market
leadership. This three-fold focus, however, is only the beginning of the journey and must
be complemented by an equally rigorous focus on the customer experience. Best-practice
organizations, therefore, commit to the customer at each stage of the buying cycle and
continue to nurture the relationship once the customer has made a purchase. In this way,
they build a loyal, ever-growing customer base and methodically add to their market
share over time.
BEST PRACTICES RESEARCH
© Frost & Sullivan 2018 11 “We Accelerate Growth”
Key Performance Criteria
For the Market Leadership Award, we focused on specific criteria to determine the areas of
performance excellence that led to the company’s leadership position. The criteria we
considered include (although not limited to) the following:
Criterion Requirement
Growth Strategy Excellence
Demonstrated ability to consistently identify,
prioritize, and pursue emerging growth
opportunities
Implementation Excellence
Processes support the efficient and consistent
implementation of tactics designed to support the
strategy
Brand Strength
The possession of a brand that is respected,
recognized, and remembered
Product Quality
The product or service receives high marks for
performance, functionality, and reliability at every
stage of the life cycle
Product Differentiation
The product or service has carved out a market
niche, whether based on price, quality, or
uniqueness of offering (or some combination of the
three) that another company cannot easily duplicate
Technology Leverage
Demonstrated commitment to incorporating leading-
edge technologies into product offerings, for greater
product performance and value
Price/Performance Value
Products or services offer the best value for the
price, compared to similar offerings in the market
Customer Purchase Experience
Customers feel they are buying the most optimal
solution that addresses both their unique needs and
their unique constraints
Customer Ownership Experience
Customers are proud to own the company’s product
or service, and have a positive experience
throughout the life of the product or service
Customer Service Experience
Customer service is accessible, fast, stress-free, and
of high quality
BEST PRACTICES RESEARCH
© Frost & Sullivan 2018 12 “We Accelerate Growth”
Best Practices Recognition: 10 Steps to Researching,
Identifying, and Recognizing Best Practices
Our analyst team strives to follow a 10-step process (illustrated below) to evaluate Award
candidates and assess their fit with our best practice criteria. The reputation and integrity
of our Awards are based on close adherence to this process.
STEP OBJECTIVE KEY ACTIVITIES OUTPUT
1
Monitor,
target, and
screen
Identify Award recipient
candidates from around the
globe
• Conduct in-depth industry
research
• Identify emerging sectors
• Scan multiple geographies
Pipeline of candidates who
potentially meet all best-
practice criteria
2
Perform
360-degree
research
Perform comprehensive,
360-degree research on all
candidates in the pipeline
• Interview thought leaders
and industry practitioners
• Assess candidates’ fit with
best-practice criteria
• Rank all candidates
Matrix positioning of all
candidates’ performance
relative to one another
3
Invite
thought
leadership in
best
practices
Perform in-depth
examination of all candidates
• Confirm best-practice criteria
• Examine eligibility of all
candidates
• Identify any information gaps
Detailed profiles of all
ranked candidates
4
Initiate
research
director
review
Conduct an unbiased
evaluation of all candidate
profiles
• Brainstorm ranking options
• Invite multiple perspectives
on candidates’ performance
• Update candidate profiles
Final prioritization of all
eligible candidates and
companion best-practice
positioning paper
5
Assemble
panel of
industry
experts
Present findings to an expert
panel of industry thought
leaders
• Share findings
• Strengthen cases for
candidate eligibility
• Prioritize candidates
Refined list of prioritized
Award candidates
6
Conduct
global
industry
review
Build consensus on Award
candidates’ eligibility
• Hold global team meeting to
review all candidates
• Pressure-test fit with criteria
• Confirm inclusion of all
eligible candidates
Final list of eligible Award
candidates, representing
success stories worldwide
7
Perform
quality check
Develop official Award
consideration materials
• Perform final performance
benchmarking activities
• Write nominations
• Perform quality review
High-quality, accurate, and
creative presentation of
nominees’ successes
8
Reconnect
with panel of
industry
experts
Finalize the selection of the
best-practice Award recipient
• Review analysis with panel
• Build consensus
• Select recipient
Decision on which company
performs best against all
best-practice criteria
9
Communicate
recognition
Inform Award recipient of
Award recognition
• Inspire the organization for
continued success
• Celebrate the recipient’s
performance
Announcement of Award
and plan for how recipient
can use the Award to
enhance the brand
10
Take
strategic
action
Upon licensing, company is
able to share Award news
with stakeholders and
customers
• Coordinate media outreach
• Design a marketing plan
• Assess Award’s role in future
strategic planning
Widespread awareness of
recipient’s Award status
among investors, media
personnel, and employees
BEST PRACTICES RESEARCH
© Frost & Sullivan 2018 13 “We Accelerate Growth”
The Intersection between 360-Degree Research and Best
Practices Awards
Research Methodology
Frost & Sullivan’s 360-degree research
methodology represents the analytical
rigor of our research process. It offers a
360-degree-view of industry challenges,
trends, and issues by integrating all 7 of
Frost & Sullivan's research methodologies.
Too often companies make important
growth decisions based on a narrow
understanding of their environment,
leading to errors of both omission and
commission. Successful growth strategies
are founded on a thorough understanding
of market, technical, economic, financial,
customer, best practices, and demographic
analyses. The integration of these research
disciplines into the 360-degree research
methodology provides an evaluation
platform for benchmarking industry
participants and for identifying those performing at best-in-class levels.
About Frost & Sullivan
Frost & Sullivan, the Growth Partnership Company, enables clients to accelerate growth
and achieve best-in-class positions in growth, innovation and leadership. The company's
Growth Partnership Service provides the CEO and the CEO's Growth Team with disciplined
research and best practice models to drive the generation, evaluation and implementation
of powerful growth strategies. Frost & Sullivan leverages more than 50 years of
experience in partnering with Global 1000 companies, emerging businesses, and the
investment community from 45 offices on six continents. To join our Growth Partnership,
please visit http://www.frost.com.
360-DEGREE RESEARCH: SEEING ORDER IN
THE CHAOS

More Related Content

What's hot

Frost & Sullivan 2015 North American Encrypted Network Security Solutions New...
Frost & Sullivan 2015 North American Encrypted Network Security Solutions New...Frost & Sullivan 2015 North American Encrypted Network Security Solutions New...
Frost & Sullivan 2015 North American Encrypted Network Security Solutions New...Unisys Corporation
 
Sample Cloud Security - Manufacturing
Sample Cloud Security - ManufacturingSample Cloud Security - Manufacturing
Sample Cloud Security - ManufacturingResearchFox
 
RocketCyber Top 10 Security Startups - 2019
RocketCyber Top 10 Security Startups - 2019RocketCyber Top 10 Security Startups - 2019
RocketCyber Top 10 Security Startups - 2019RocketCyber
 
Sample Cloud Security - Government
Sample Cloud Security - GovernmentSample Cloud Security - Government
Sample Cloud Security - GovernmentResearchFox
 
FS-ISAC APAC Summit 2017 Singapore - Of Crown Jewels and Data Assets
FS-ISAC APAC Summit 2017 Singapore - Of Crown Jewels and Data AssetsFS-ISAC APAC Summit 2017 Singapore - Of Crown Jewels and Data Assets
FS-ISAC APAC Summit 2017 Singapore - Of Crown Jewels and Data AssetsPuneet Kukreja
 
Sample Cloud Security - Healthcare
Sample Cloud Security - HealthcareSample Cloud Security - Healthcare
Sample Cloud Security - HealthcareResearchFox
 
Sample Cloud Security - SMB
Sample Cloud Security - SMBSample Cloud Security - SMB
Sample Cloud Security - SMBResearchFox
 
Delve Labs - Upcoming Security Challenges for the Internet of Things
Delve Labs - Upcoming Security Challenges for the Internet of ThingsDelve Labs - Upcoming Security Challenges for the Internet of Things
Delve Labs - Upcoming Security Challenges for the Internet of ThingsFrederic Roy-Gobeil, CPA, CGA, M.Tax.
 
Symantec's London vision 2014 event more details emerge on the company split
Symantec's London vision 2014 event more details emerge on the company splitSymantec's London vision 2014 event more details emerge on the company split
Symantec's London vision 2014 event more details emerge on the company splitLluis Altes
 
GFI LanGuard SDK - Business Datasheet
GFI LanGuard SDK - Business DatasheetGFI LanGuard SDK - Business Datasheet
GFI LanGuard SDK - Business DatasheetAndre Muscat
 
There's No Such Thing As "Downtime" In a Hospital
There's No Such Thing As "Downtime" In a HospitalThere's No Such Thing As "Downtime" In a Hospital
There's No Such Thing As "Downtime" In a HospitalNETSCOUT
 
Sample Cloud Security - Enterprise
Sample Cloud Security - EnterpriseSample Cloud Security - Enterprise
Sample Cloud Security - EnterpriseResearchFox
 
The Secure Path to Value in the Cloud by Denny Heaberlin
The Secure Path to Value in the Cloud by Denny HeaberlinThe Secure Path to Value in the Cloud by Denny Heaberlin
The Secure Path to Value in the Cloud by Denny HeaberlinCloud Expo
 
Security Redefined - Prevention is the future!!
Security Redefined - Prevention is the future!!Security Redefined - Prevention is the future!!
Security Redefined - Prevention is the future!!Daniel L. Cruz
 
Sample Cloud Security - APAC
Sample Cloud Security - APACSample Cloud Security - APAC
Sample Cloud Security - APACResearchFox
 
Securing Manufacturing: How we can improve speed and efficiency while protect...
Securing Manufacturing: How we can improve speed and efficiency while protect...Securing Manufacturing: How we can improve speed and efficiency while protect...
Securing Manufacturing: How we can improve speed and efficiency while protect...Conor Bronsdon
 
Arc Sight Info Documents 10 21 2009
Arc Sight Info Documents 10 21 2009Arc Sight Info Documents 10 21 2009
Arc Sight Info Documents 10 21 2009mattdriscoll
 
Mobility Security - A Business-Centric Approach
Mobility Security - A Business-Centric ApproachMobility Security - A Business-Centric Approach
Mobility Security - A Business-Centric ApproachOmar Khawaja
 

What's hot (20)

Frost & Sullivan 2015 North American Encrypted Network Security Solutions New...
Frost & Sullivan 2015 North American Encrypted Network Security Solutions New...Frost & Sullivan 2015 North American Encrypted Network Security Solutions New...
Frost & Sullivan 2015 North American Encrypted Network Security Solutions New...
 
Sample Cloud Security - Manufacturing
Sample Cloud Security - ManufacturingSample Cloud Security - Manufacturing
Sample Cloud Security - Manufacturing
 
Security - A Digital Transformation Enabler
Security - A Digital Transformation EnablerSecurity - A Digital Transformation Enabler
Security - A Digital Transformation Enabler
 
RocketCyber Top 10 Security Startups - 2019
RocketCyber Top 10 Security Startups - 2019RocketCyber Top 10 Security Startups - 2019
RocketCyber Top 10 Security Startups - 2019
 
Sample Cloud Security - Government
Sample Cloud Security - GovernmentSample Cloud Security - Government
Sample Cloud Security - Government
 
FS-ISAC APAC Summit 2017 Singapore - Of Crown Jewels and Data Assets
FS-ISAC APAC Summit 2017 Singapore - Of Crown Jewels and Data AssetsFS-ISAC APAC Summit 2017 Singapore - Of Crown Jewels and Data Assets
FS-ISAC APAC Summit 2017 Singapore - Of Crown Jewels and Data Assets
 
Sample Cloud Security - Healthcare
Sample Cloud Security - HealthcareSample Cloud Security - Healthcare
Sample Cloud Security - Healthcare
 
IE_ERS_CyberAnalysisReport
IE_ERS_CyberAnalysisReportIE_ERS_CyberAnalysisReport
IE_ERS_CyberAnalysisReport
 
Sample Cloud Security - SMB
Sample Cloud Security - SMBSample Cloud Security - SMB
Sample Cloud Security - SMB
 
Delve Labs - Upcoming Security Challenges for the Internet of Things
Delve Labs - Upcoming Security Challenges for the Internet of ThingsDelve Labs - Upcoming Security Challenges for the Internet of Things
Delve Labs - Upcoming Security Challenges for the Internet of Things
 
Symantec's London vision 2014 event more details emerge on the company split
Symantec's London vision 2014 event more details emerge on the company splitSymantec's London vision 2014 event more details emerge on the company split
Symantec's London vision 2014 event more details emerge on the company split
 
GFI LanGuard SDK - Business Datasheet
GFI LanGuard SDK - Business DatasheetGFI LanGuard SDK - Business Datasheet
GFI LanGuard SDK - Business Datasheet
 
There's No Such Thing As "Downtime" In a Hospital
There's No Such Thing As "Downtime" In a HospitalThere's No Such Thing As "Downtime" In a Hospital
There's No Such Thing As "Downtime" In a Hospital
 
Sample Cloud Security - Enterprise
Sample Cloud Security - EnterpriseSample Cloud Security - Enterprise
Sample Cloud Security - Enterprise
 
The Secure Path to Value in the Cloud by Denny Heaberlin
The Secure Path to Value in the Cloud by Denny HeaberlinThe Secure Path to Value in the Cloud by Denny Heaberlin
The Secure Path to Value in the Cloud by Denny Heaberlin
 
Security Redefined - Prevention is the future!!
Security Redefined - Prevention is the future!!Security Redefined - Prevention is the future!!
Security Redefined - Prevention is the future!!
 
Sample Cloud Security - APAC
Sample Cloud Security - APACSample Cloud Security - APAC
Sample Cloud Security - APAC
 
Securing Manufacturing: How we can improve speed and efficiency while protect...
Securing Manufacturing: How we can improve speed and efficiency while protect...Securing Manufacturing: How we can improve speed and efficiency while protect...
Securing Manufacturing: How we can improve speed and efficiency while protect...
 
Arc Sight Info Documents 10 21 2009
Arc Sight Info Documents 10 21 2009Arc Sight Info Documents 10 21 2009
Arc Sight Info Documents 10 21 2009
 
Mobility Security - A Business-Centric Approach
Mobility Security - A Business-Centric ApproachMobility Security - A Business-Centric Approach
Mobility Security - A Business-Centric Approach
 

Similar to Cisco Award Write Up

Lessons Learned: Protecting Critical Infrastructure from Cyber Attacks
Lessons Learned: Protecting Critical Infrastructure from Cyber AttacksLessons Learned: Protecting Critical Infrastructure from Cyber Attacks
Lessons Learned: Protecting Critical Infrastructure from Cyber AttacksMighty Guides, Inc.
 
Frost Entrust Datacard-award-write-up-final
Frost Entrust Datacard-award-write-up-finalFrost Entrust Datacard-award-write-up-final
Frost Entrust Datacard-award-write-up-finalWendy Murphy
 
corporate-brochure.pdf
corporate-brochure.pdfcorporate-brochure.pdf
corporate-brochure.pdfLolaHel
 
Security analytics market
Security analytics marketSecurity analytics market
Security analytics marketpallavi_1234
 
Cyber Immunity Unleashed: Explore the Future with iTech Magazine!
Cyber Immunity Unleashed: Explore the Future with iTech Magazine!Cyber Immunity Unleashed: Explore the Future with iTech Magazine!
Cyber Immunity Unleashed: Explore the Future with iTech Magazine!DIGITALCONFEX
 
Industry Overview: Big Data Fuels Intelligence-Driven Security
Industry Overview: Big Data Fuels Intelligence-Driven SecurityIndustry Overview: Big Data Fuels Intelligence-Driven Security
Industry Overview: Big Data Fuels Intelligence-Driven SecurityEMC
 
Network Monitoring Market.pdf
Network Monitoring Market.pdfNetwork Monitoring Market.pdf
Network Monitoring Market.pdfpavanjanawade1
 
Assessing the Business Value of SDN Datacenter Security Solutions
Assessing the Business Value of SDN Datacenter Security SolutionsAssessing the Business Value of SDN Datacenter Security Solutions
Assessing the Business Value of SDN Datacenter Security Solutionsxband
 
4-lessons-of-security-leaders-for-2022.pdf
4-lessons-of-security-leaders-for-2022.pdf4-lessons-of-security-leaders-for-2022.pdf
4-lessons-of-security-leaders-for-2022.pdfJose R
 
F_DR_Dark Reading Editorial Report_March 2022.pdf
F_DR_Dark Reading Editorial Report_March 2022.pdfF_DR_Dark Reading Editorial Report_March 2022.pdf
F_DR_Dark Reading Editorial Report_March 2022.pdfjosbjs
 
Cyber security basics for law firms
Cyber security basics for law firmsCyber security basics for law firms
Cyber security basics for law firmsRobert Westmacott
 
AGEOS Infrastructure Cyber Security White Paper
AGEOS Infrastructure Cyber Security White PaperAGEOS Infrastructure Cyber Security White Paper
AGEOS Infrastructure Cyber Security White PaperMestizo Enterprises
 
Optiv Security Award Write Up
Optiv Security Award Write UpOptiv Security Award Write Up
Optiv Security Award Write UpClaudia Toscano
 
Claroty Award Write Up
Claroty Award Write UpClaroty Award Write Up
Claroty Award Write UpAna Arriaga
 
Cisco Connect 2018 Singapore - Changing the Security Equation
Cisco Connect 2018 Singapore - Changing the Security EquationCisco Connect 2018 Singapore - Changing the Security Equation
Cisco Connect 2018 Singapore - Changing the Security EquationNetworkCollaborators
 
Why Integrating Network Technology & Security Makes Sense Now
Why Integrating Network Technology & Security Makes Sense NowWhy Integrating Network Technology & Security Makes Sense Now
Why Integrating Network Technology & Security Makes Sense NowAbaram Network Solutions
 
The 5 most trusted cyber security companies to watch.
The 5 most trusted cyber security companies to watch.The 5 most trusted cyber security companies to watch.
The 5 most trusted cyber security companies to watch.Merry D'souza
 
President Donald Trump - Cybersecurity - National Institute of Standards and ...
President Donald Trump - Cybersecurity - National Institute of Standards and ...President Donald Trump - Cybersecurity - National Institute of Standards and ...
President Donald Trump - Cybersecurity - National Institute of Standards and ...Clifton M. Hasegawa & Associates, LLC
 

Similar to Cisco Award Write Up (20)

Cisco Award Write Up
Cisco Award Write UpCisco Award Write Up
Cisco Award Write Up
 
Lessons Learned: Protecting Critical Infrastructure from Cyber Attacks
Lessons Learned: Protecting Critical Infrastructure from Cyber AttacksLessons Learned: Protecting Critical Infrastructure from Cyber Attacks
Lessons Learned: Protecting Critical Infrastructure from Cyber Attacks
 
Frost Entrust Datacard-award-write-up-final
Frost Entrust Datacard-award-write-up-finalFrost Entrust Datacard-award-write-up-final
Frost Entrust Datacard-award-write-up-final
 
corporate-brochure.pdf
corporate-brochure.pdfcorporate-brochure.pdf
corporate-brochure.pdf
 
Security analytics market
Security analytics marketSecurity analytics market
Security analytics market
 
Cyber Immunity Unleashed: Explore the Future with iTech Magazine!
Cyber Immunity Unleashed: Explore the Future with iTech Magazine!Cyber Immunity Unleashed: Explore the Future with iTech Magazine!
Cyber Immunity Unleashed: Explore the Future with iTech Magazine!
 
Industry Overview: Big Data Fuels Intelligence-Driven Security
Industry Overview: Big Data Fuels Intelligence-Driven SecurityIndustry Overview: Big Data Fuels Intelligence-Driven Security
Industry Overview: Big Data Fuels Intelligence-Driven Security
 
Investor Presentation
Investor PresentationInvestor Presentation
Investor Presentation
 
Network Monitoring Market.pdf
Network Monitoring Market.pdfNetwork Monitoring Market.pdf
Network Monitoring Market.pdf
 
Assessing the Business Value of SDN Datacenter Security Solutions
Assessing the Business Value of SDN Datacenter Security SolutionsAssessing the Business Value of SDN Datacenter Security Solutions
Assessing the Business Value of SDN Datacenter Security Solutions
 
4-lessons-of-security-leaders-for-2022.pdf
4-lessons-of-security-leaders-for-2022.pdf4-lessons-of-security-leaders-for-2022.pdf
4-lessons-of-security-leaders-for-2022.pdf
 
F_DR_Dark Reading Editorial Report_March 2022.pdf
F_DR_Dark Reading Editorial Report_March 2022.pdfF_DR_Dark Reading Editorial Report_March 2022.pdf
F_DR_Dark Reading Editorial Report_March 2022.pdf
 
Cyber security basics for law firms
Cyber security basics for law firmsCyber security basics for law firms
Cyber security basics for law firms
 
AGEOS Infrastructure Cyber Security White Paper
AGEOS Infrastructure Cyber Security White PaperAGEOS Infrastructure Cyber Security White Paper
AGEOS Infrastructure Cyber Security White Paper
 
Optiv Security Award Write Up
Optiv Security Award Write UpOptiv Security Award Write Up
Optiv Security Award Write Up
 
Claroty Award Write Up
Claroty Award Write UpClaroty Award Write Up
Claroty Award Write Up
 
Cisco Connect 2018 Singapore - Changing the Security Equation
Cisco Connect 2018 Singapore - Changing the Security EquationCisco Connect 2018 Singapore - Changing the Security Equation
Cisco Connect 2018 Singapore - Changing the Security Equation
 
Why Integrating Network Technology & Security Makes Sense Now
Why Integrating Network Technology & Security Makes Sense NowWhy Integrating Network Technology & Security Makes Sense Now
Why Integrating Network Technology & Security Makes Sense Now
 
The 5 most trusted cyber security companies to watch.
The 5 most trusted cyber security companies to watch.The 5 most trusted cyber security companies to watch.
The 5 most trusted cyber security companies to watch.
 
President Donald Trump - Cybersecurity - National Institute of Standards and ...
President Donald Trump - Cybersecurity - National Institute of Standards and ...President Donald Trump - Cybersecurity - National Institute of Standards and ...
President Donald Trump - Cybersecurity - National Institute of Standards and ...
 

More from Claudia Toscano

Compliancequest Award Write Up
Compliancequest Award Write UpCompliancequest Award Write Up
Compliancequest Award Write UpClaudia Toscano
 
Siemens Healthineers Award Write Up
Siemens Healthineers Award Write UpSiemens Healthineers Award Write Up
Siemens Healthineers Award Write UpClaudia Toscano
 
Proofpoint Email Security Award Write Up
Proofpoint  Email Security Award Write UpProofpoint  Email Security Award Write Up
Proofpoint Email Security Award Write UpClaudia Toscano
 
Proofpoint Security Awareness Award Write Up
Proofpoint Security Awareness Award Write UpProofpoint Security Awareness Award Write Up
Proofpoint Security Awareness Award Write UpClaudia Toscano
 
WENZEL Group GmbH & Co. KG
WENZEL Group GmbH & Co. KGWENZEL Group GmbH & Co. KG
WENZEL Group GmbH & Co. KGClaudia Toscano
 
Intermedia Award Write Up
Intermedia Award Write UpIntermedia Award Write Up
Intermedia Award Write UpClaudia Toscano
 
NanoXplore Award Write Up
NanoXplore Award Write UpNanoXplore Award Write Up
NanoXplore Award Write UpClaudia Toscano
 
Zf Friedrichshafen Award Write Up
Zf Friedrichshafen Award Write UpZf Friedrichshafen Award Write Up
Zf Friedrichshafen Award Write UpClaudia Toscano
 
INTEGRA Bioscience Award Write Up
INTEGRA Bioscience Award Write UpINTEGRA Bioscience Award Write Up
INTEGRA Bioscience Award Write UpClaudia Toscano
 
Zonar Systems Award Write Up
Zonar Systems Award Write UpZonar Systems Award Write Up
Zonar Systems Award Write UpClaudia Toscano
 

More from Claudia Toscano (20)

Compliancequest Award Write Up
Compliancequest Award Write UpCompliancequest Award Write Up
Compliancequest Award Write Up
 
Flex Award Write Up
Flex Award Write UpFlex Award Write Up
Flex Award Write Up
 
Guardhat Award Write Up
Guardhat Award Write UpGuardhat Award Write Up
Guardhat Award Write Up
 
Siemens Healthineers Award Write Up
Siemens Healthineers Award Write UpSiemens Healthineers Award Write Up
Siemens Healthineers Award Write Up
 
Proofpoint Email Security Award Write Up
Proofpoint  Email Security Award Write UpProofpoint  Email Security Award Write Up
Proofpoint Email Security Award Write Up
 
Proofpoint Security Awareness Award Write Up
Proofpoint Security Awareness Award Write UpProofpoint Security Awareness Award Write Up
Proofpoint Security Awareness Award Write Up
 
WENZEL Group GmbH & Co. KG
WENZEL Group GmbH & Co. KGWENZEL Group GmbH & Co. KG
WENZEL Group GmbH & Co. KG
 
Biamp Award Write Up
Biamp Award Write UpBiamp Award Write Up
Biamp Award Write Up
 
Intermedia Award Write Up
Intermedia Award Write UpIntermedia Award Write Up
Intermedia Award Write Up
 
GenCell Award Write Up
GenCell Award Write UpGenCell Award Write Up
GenCell Award Write Up
 
Huawei Award Write Up
Huawei Award Write UpHuawei Award Write Up
Huawei Award Write Up
 
NanoXplore Award Write Up
NanoXplore Award Write UpNanoXplore Award Write Up
NanoXplore Award Write Up
 
3M Award Write Up
3M Award Write Up3M Award Write Up
3M Award Write Up
 
3M Award Write Up
3M Award Write Up3M Award Write Up
3M Award Write Up
 
Zf Friedrichshafen Award Write Up
Zf Friedrichshafen Award Write UpZf Friedrichshafen Award Write Up
Zf Friedrichshafen Award Write Up
 
Koxka Award Write Up
Koxka Award Write UpKoxka Award Write Up
Koxka Award Write Up
 
Optum Award Write Up
Optum Award Write UpOptum Award Write Up
Optum Award Write Up
 
INTEGRA Bioscience Award Write Up
INTEGRA Bioscience Award Write UpINTEGRA Bioscience Award Write Up
INTEGRA Bioscience Award Write Up
 
Zonar Systems Award Write Up
Zonar Systems Award Write UpZonar Systems Award Write Up
Zonar Systems Award Write Up
 
Perstorp Award Write Up
Perstorp Award Write UpPerstorp Award Write Up
Perstorp Award Write Up
 

Recently uploaded

Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataAdobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataBradBedford3
 
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...stazi3110
 
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...soniya singh
 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software DevelopersVinodh Ram
 
Unveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsUnveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsAhmed Mohamed
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...MyIntelliSource, Inc.
 
The Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdfThe Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdfPower Karaoke
 
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...gurkirankumar98700
 
software engineering Chapter 5 System modeling.pptx
software engineering Chapter 5 System modeling.pptxsoftware engineering Chapter 5 System modeling.pptx
software engineering Chapter 5 System modeling.pptxnada99848
 
React Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief UtamaReact Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief UtamaHanief Utama
 
Folding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a seriesFolding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a seriesPhilip Schwarz
 
Cloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackCloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackVICTOR MAESTRE RAMIREZ
 
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideChristina Lin
 
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024StefanoLambiase
 
What is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWhat is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWave PLM
 
Intelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmIntelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmSujith Sukumaran
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...MyIntelliSource, Inc.
 
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEBATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEOrtus Solutions, Corp
 
MYjobs Presentation Django-based project
MYjobs Presentation Django-based projectMYjobs Presentation Django-based project
MYjobs Presentation Django-based projectAnoyGreter
 

Recently uploaded (20)

Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataAdobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
 
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
 
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software Developers
 
Unveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsUnveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML Diagrams
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
 
The Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdfThe Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdf
 
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
 
software engineering Chapter 5 System modeling.pptx
software engineering Chapter 5 System modeling.pptxsoftware engineering Chapter 5 System modeling.pptx
software engineering Chapter 5 System modeling.pptx
 
React Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief UtamaReact Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief Utama
 
Folding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a seriesFolding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a series
 
Cloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackCloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStack
 
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
 
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
 
What is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWhat is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need It
 
Intelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmIntelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalm
 
Call Girls In Mukherjee Nagar 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
Call Girls In Mukherjee Nagar 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...Call Girls In Mukherjee Nagar 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
Call Girls In Mukherjee Nagar 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
 
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEBATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
 
MYjobs Presentation Django-based project
MYjobs Presentation Django-based projectMYjobs Presentation Django-based project
MYjobs Presentation Django-based project
 

Cisco Award Write Up

  • 1. 2018 Global Network Access Control Market Leadership Award 2018
  • 2. BEST PRACTICES RESEARCH © Frost & Sullivan 2018 2 “We Accelerate Growth” Contents Background and Company Performance ........................................................................3 Industry Challenges..............................................................................................3 Market Leadership of Cisco ....................................................................................4 Conclusion...........................................................................................................9 Significance of Market Leadership...............................................................................10 Understanding Market Leadership...............................................................................10 Key Performance Criteria ..........................................................................................11 Best Practices Recognition: 10 Steps to Researching, Identifying, and Recognizing Best Practices .................................................................................................................12 The Intersection between 360-Degree Research and Best Practices Awards.....................13 Research Methodology ........................................................................................13 About Frost & Sullivan ..............................................................................................13
  • 3. BEST PRACTICES RESEARCH © Frost & Sullivan 2018 3 “We Accelerate Growth” Background and Company Performance Industry Challenges Network visibility of endpoints is critical. Every device on a network is a potential attack or reconnaissance point that must be discovered and secured. Organizations are faced with the increasing level of malware and cyber attacks. The enterprise network no longer sits within four secure walls. It extends to wherever employees and data travel. Mobility, digitization, and the Internet of Things (IoT) are changing the way we live and work. The result is that networks are expanding, resulting in increasing complexity of managing resources and disparate security solutions. Network access control (NAC) is a foundational network security defense. NAC is about connecting trusted users with trusted network services. The majority of NAC deployments use the 802.1X protocol, an IEEE 802.1X open-standard protocol for port-based secure access. More advanced NAC solutions have gone well beyond stand AAA (authentication, authority and accounting) to enable rich user and device visibility for more streamlined, flexible, and secure services. Secure access also requires policy and access control for scalable segmentation in today's highly distributed networks. IoT and mobility trends present potential threat vectors that organizations need to manage. According to Frost & Sullivan, there will be 45.4 billion connected devices by 2023. Most of these will be IoT devices. The high growth of IoT presents risk to enterprise networks since most organizations don't have full visibility and comprehensive secure access applied to all users and devices. It is not only the volume of devices but also the diversity of OS’s and devices that poses a challenge. Most IoT devices lack the resources for embedding an agent, thus agentless technology is required. As the volume of device diversity increases, the ability of an organization to see and control devices declines. This makes NAC's capabilities more relevant than ever. Organizations need to develop visibility across the enterprise: campus, data center, private cloud, public cloud and Operational Technology (OT) networks. Other protocols in addition to 802.1X need to be supported. Organizations face challenges as IT and OT converge. For example, OT networks were isolated silos, but are now morphing into the Industrial Internet of Things (IIoT). OT networks are no longer physically separated from IT networks. Threats are moving between cyber and physical dimensions. Most OT devices are difficult to patch. Organizations are migrating workloads to the cloud, both public and private. Support is needed for AWS, Azure and other cloud computing platforms. Network administrators must deal with multiple device locations and access points. It is a heterogeneous environment with multiple vendors and management is typically decentralized. While NAC is a powerful security tool, it is a very complex technology that can be difficult to implement. Unlike the earlier generation of NAC, which was intrusive and restrictive,
  • 4. BEST PRACTICES RESEARCH © Frost & Sullivan 2018 4 “We Accelerate Growth” NAC vendors must focus on easing deployment and management, and providing IT complete visibility into every endpoint on their networks. The complexities of NAC deployment and management can be a factor of a) the customer's tendency to use multiple security solutions that are not integrated and orchestrated and b) the severe shortage of skilled professional security experts to manage them. More than 25% of organizations use anywhere between 11-20 security vendors and 16% of organizations have been found to use anywhere between 20-50. Leveraging a multitude of security vendors that are not integrated and orchestrated can produce a significant volume of security alerts that can be overwhelming for any limited security staff to manage. Organizations are in need of a security system that automates, integrates and orchestrates with other security solutions such as Next Generation Fire Wall (NGFW), Security Information and Event Management (SIEM), and threat intelligence networks in order to increase NAC efficacy and justify its investment. NAC is a fast growing market. In 2017, revenues grew 23.7% to $942.3 million. Frost & Sullivan projects a compound annual growth rate from 2017 to 2022 of 16.9%. While the high growth rate and size of the NAC market has attracted more than 12 vendors in the last few years, establishing a leadership position in such a competitive market is challenging both incumbent and new vendors in NAC. Market Leadership of Cisco The NAC market is dominated by Enterprise and Large Enterprise customers, organizations with 2,500 or more employees. This is Cisco’s primary customer base. Cisco Identity Services Engine (ISE) is the leading vendor in the NAC market. It holds 34.3% market share (see graph) and has held that top spot for several years. Cisco ISE has over 29,000 customers, representing virtually every industry and a majority of the Fortune 500. Cisco is the dominant NAC player in Enterprise and Large Enterprise segments. It also dominates every vertical market and geographic region. Cisco is able to effectively serve these large organizations by integrating ISE within its broad security portfolio and leadership position in networking equipment and services. Cisco is the largest enterprise and security vendor by revenue and is well established with large organizations. Cisco ISE is an integrated, open, and scalable solution that provides visibility, technology integration, automation, and granular policy control from a user and their device, and devices without users right to a resource or application. It's comprised of applications, services, and network controller features. ISE works closely with other Cisco technologies such as Talos (threat intelligence organization), StealthWatch and Advanced Malware Protection (AMP). Cisco has focused
  • 5. BEST PRACTICES RESEARCH © Frost & Sullivan 2018 5 “We Accelerate Growth” on growing its third-party ecosystem and partnerships. ISE 2.4 extends Cisco's focus on providing device profiling and visibility into the emerging industrial IoT market, especially in Manufacturing and Healthcare. Additionally, ISE has been incorporated into the Cisco Software-Defined Access solution, which is an architecture highly reliant on scalable policy services for what the industries terms "intent-based networking". In the company’s 2017 annual report, Cisco states, “We believe that security is the top IT priority for many of our customers. Our security strategy is focused on delivering a unified threat-centric security architecture combining network, cloud and endpoint-based solutions. Through this approach, we intend to provide security across the entire attack continuum before, during, and after a cyberattack to help our customers shorten the time between threat detection and response.” Cisco’s NAC solution is an integral part of its overall integrated security strategy. Cisco’s total security segment grew 9.3% in fiscal 2017, compared to total corporate revenue drop of 4.2%. Frost & Sullivan estimates that Cisco NAC had revenues of $323 million in calendar 2017, growing 13.9% over 2016. Thus, NAC is a growth driver for Cisco’s fast growing security segment.
  • 6. BEST PRACTICES RESEARCH © Frost & Sullivan 2018 6 “We Accelerate Growth” Growth Strategy Excellence Cisco has a broad customer base in the NAC market covering virtually every industry. Cisco ISE is comprehensive, scalable and can be geared to the needs of a specific industry. With clear,role-based segmentation Cisco has been consistently solving challenges for customers in the Financial Services industry. Cisco ISE also expands into IoT use cases with an increased interest from the OT industry. The company has success with customers in the Manufacturing and Healthcare industries with its Industrial Network Director and Medical NAC product offerings. Cisco partners with clinics, hospitals and medical equipment manufacturers to develop a holistic solution that not only identifies medical devices such as a blood pressure monitor, but also helps define policies on the level of access provided to the device on the network. Cisco has a proven solution for PCI compliance to serve the Retail market. Cisco group-based policy standards has dramatically simplified PCI compliance. Cisco leverages its security portfolio and networking equipment to grow its NAC offering. Through pxGrid, Cisco ISE is integrated with more than 100 security partners and orchestrated with other security solutions, both Cisco’s and other security vendors. Most of Cisco’s ISE revenues are currently derived from physical appliance sales. However, the company is focusing on developing innovations for virtual appliance, cloud services and IoT. The company has made further investments in IoT, BYOD and segmentation. Cisco continues to innovate ISE through internal development as well as key acquisitions. Some of these acquisitions are technologies that are used across its security portfolio. For example: • Duo Security (August 2, 2018 - announced intent to aqcuire) - helps defend organizations against data breaches by making security easy and effective • Skyport Systems (January 24, 2018) - provides cloud-managed, hyper-converged systems that run and protect business-critical applications. • Perspica, Inc. (October 19, 2017) - provides machine learning and data processing technology and expertise. • Observable Networks, Inc. (July 13, 2017) - technology is based on dynamic behavioral modeling of all devices on the network. Cisco is using this technology to extend its Stealthwatch solution into the cloud with highly scalable behavior analytics and comprehensive visibility.
  • 7. BEST PRACTICES RESEARCH © Frost & Sullivan 2018 7 “We Accelerate Growth” • Viptela Inc. (May 1, 2017) - provides a compelling software-defined wide area network (SD-WAN) solution that simplifies management. The cloud-first approach also aligns with Cisco's Digital Network Architecture (DNA) transition to software- driven, automated networks that are more flexible, responsive and dynamic. • ContainerX, Inc. (August 30, 2016) - technology to help enterprises manage, orchestrate and integrate containers across data centers. • Jasper Technologies, Inc. (February 3, 2016) – the industry’s leading IoT service platform in terms of number of enterprises and service providers. Product Quality Cisco’s ISE architecture goes beyond the traditional Authentication, Authorization and Accounting (AAA). Cisco ISE offers a broad and comprehensive range of features which it continues to expand. Cisco offers scalability ranging from small sites to millions of users. For example, the upper limit of Cisco’s ISE deployments is upward of 500,000 concurrent endpoints, scalable to 1.5 million endpoints. ISE offers the ability to profile and obtain the contextual identity of any device that connects to the network. Cisco provides profiles for specific verticals, such as Healthcare and Manufacturing. It offers authentication methods for both passive and active identity. The Cisco physical appliance node deployment architecture provides redundancy. Cisco continues to develop threat-centric NAC enhancements with its growing intelligence ecosystem, TALOS. The ISE pxGrid partner ecosystem is growing. Customers invest in Cisco ISE for several reasons: • The company offers a comprehensive solution from endpoint to an application in the data center. • ISE addresses numerous secure access use cases and integrates across a vast set of security and networking solutions. • Superior visibility, through device profiling and device-profile feed service, reduces the number of unknown endpoints. • Cisco’s market-leading AnyConnect, with over 120 million endpoints, provides visibility. • ISE is the policy controller for Software-defined Access that allows for extremely granular segmentation options. Through integration, open systems, and native features, ISE enables extensive automation that makes it less human-resource intensive to provide secure services and easier for workers to access the services they require from anywhere. ISE represents
  • 8. BEST PRACTICES RESEARCH © Frost & Sullivan 2018 8 “We Accelerate Growth” numerous integrated technologies with the flexibility to craft services for virtually any size or type of operation, regardless of industry or size. Implementation Excellence Deploying and implementing a NAC solution can be a daunting task for many customers. The shortage of security professionals makes it difficult for organizations to have the necessary expertise. ISE provides customers with a Secure Access Wizard (SAW). This tool enables configuration of all necessary settings plus basic customization of Guest, BYOD and Secure Access (802.1X) flows. The tool configures ISE and the Wireless Controller in a matter of minutes. Simplifying the deployment of its NAC Solution is an ongoing development. Cisco ISE provides a centralized dashboard that provides comprehensive monitoring, customizable reporting, and alarms for all of its native functions. Cisco drives industry standards through its commitment to delivering a simple, open and automated security architecture. The company offers out of the box simplicity for guest administration and onboarding, BYOD, and secure access. Technical support is available from both internal customer service and highly-trained and certified partners. Cisco touts its high scalability which allows organizations to use fewer NAC appliances and scale to 1,500,000 total and 500,000 concurrent endpoints and devices. ISE is vendor- neutral in its support for access control and segmentation with market-leading technologies. Cisco’s pxGrid enables integration with virtually any security intelligence technology. Brand Strength Cisco ISE is the NAC market leader with more deployments than any other vendor and is trusted to deliver, support, and continuously improve its solution to meet current and future access control and security requirements. Cisco leverages its well-known and broad security portfolio integrating ISE with Cisco's AMP, CTA, Stealthwatch and Firepower next generation firewall and intrusion prevention technologies. Unlike competitors who offer point solutions, ISE benefits from being a centerpiece of a comprehensive security strategy framework that covers the campus, network, data center and cloud. It is well established with large organizations. Cisco offers engineering, network design and maintenance, and professional services for enterprises. Strategic Partnerships Cisco ISE integrates with over 100 ecosystem partners to provide an all-encompassing NAC solution. The company has an extensive network of highly trained partners on ISE. ISE has a broad integration partner ecosystem covering 50+ partner product integrations
  • 9. BEST PRACTICES RESEARCH © Frost & Sullivan 2018 9 “We Accelerate Growth” in 14 distinct technology areas. ISE can send and receive context from ecosystem partners to make better secure network access policy decisions. The ISE pxGrid has over 100 partner integrations and is growing. Cisco recently announced a partnership with McAfee. Cisco pxGrid integrates with the McAfee OpenDXL security fabric. This interoperability delivers unprecedented breadth in multi-vendor collaboration and simplifies security vendor integration for customers. The integration helps respective threat response ecosystem partners collaborate through ISE and McAfee ePO. The result is a combined threat response partner community of more than 100 security vendors along with contributions from an open source community. Conclusion NAC is a mature product category but vendors need to innovate to meet the changing needs of the market. The NAC market is evolving as enterprise networks expand beyond the traditional secure walls. NAC vendors must contend with the emerging trends of IoT, mobility, BYOD, IT and OT convergence, and cloud usage. Security orchestration and integration with other security solutions is an important NAC function. Cisco has a broad security product portfolio, but also works with other security vendors to increase NAC efficacy. Cisco is addressing the specific needs of its customers in all vertical markets with an open and flexible NAC architecture. Cisco ISE is a comprehensive and scalable solution with a wide set of features and functions. The company is investing in Software-defined Access for intent-based networking. In addition to its internal technology development, Cisco is making strategic acquisitions for technologies that will enhance all of its security products. It is leveraging these improvements into ISE. Cisco is driving widespread adoption of ISE with its growing partner ecosystem. With its strong overall performance, Cisco has achieved a leadership position in the NAC market with a market share of 34.3%, and Frost & Sullivan is proud to bestow the 2018 Market Leadership Award to Cisco.
  • 10. BEST PRACTICES RESEARCH © Frost & Sullivan 2018 10 “We Accelerate Growth” Significance of Market Leadership Ultimately, growth in any organization depends upon customers purchasing from a company, and then making the decision to return time and again. Loyal customers become brand advocates; brand advocates recruit new customers; the company grows; and then it attains market leadership. To achieve and maintain market leadership, an organization must strive to be best-in-class in three key areas: understanding demand, nurturing the brand, and differentiating from the competition. This three-fold approach to delivering market leadership is explored further below. Understanding Market Leadership As discussed on the previous page, driving demand, strengthening the brand, and differentiating from the competition all play a critical role in a company’s path to market leadership. This three-fold focus, however, is only the beginning of the journey and must be complemented by an equally rigorous focus on the customer experience. Best-practice organizations, therefore, commit to the customer at each stage of the buying cycle and continue to nurture the relationship once the customer has made a purchase. In this way, they build a loyal, ever-growing customer base and methodically add to their market share over time.
  • 11. BEST PRACTICES RESEARCH © Frost & Sullivan 2018 11 “We Accelerate Growth” Key Performance Criteria For the Market Leadership Award, we focused on specific criteria to determine the areas of performance excellence that led to the company’s leadership position. The criteria we considered include (although not limited to) the following: Criterion Requirement Growth Strategy Excellence Demonstrated ability to consistently identify, prioritize, and pursue emerging growth opportunities Implementation Excellence Processes support the efficient and consistent implementation of tactics designed to support the strategy Brand Strength The possession of a brand that is respected, recognized, and remembered Product Quality The product or service receives high marks for performance, functionality, and reliability at every stage of the life cycle Product Differentiation The product or service has carved out a market niche, whether based on price, quality, or uniqueness of offering (or some combination of the three) that another company cannot easily duplicate Technology Leverage Demonstrated commitment to incorporating leading- edge technologies into product offerings, for greater product performance and value Price/Performance Value Products or services offer the best value for the price, compared to similar offerings in the market Customer Purchase Experience Customers feel they are buying the most optimal solution that addresses both their unique needs and their unique constraints Customer Ownership Experience Customers are proud to own the company’s product or service, and have a positive experience throughout the life of the product or service Customer Service Experience Customer service is accessible, fast, stress-free, and of high quality
  • 12. BEST PRACTICES RESEARCH © Frost & Sullivan 2018 12 “We Accelerate Growth” Best Practices Recognition: 10 Steps to Researching, Identifying, and Recognizing Best Practices Our analyst team strives to follow a 10-step process (illustrated below) to evaluate Award candidates and assess their fit with our best practice criteria. The reputation and integrity of our Awards are based on close adherence to this process. STEP OBJECTIVE KEY ACTIVITIES OUTPUT 1 Monitor, target, and screen Identify Award recipient candidates from around the globe • Conduct in-depth industry research • Identify emerging sectors • Scan multiple geographies Pipeline of candidates who potentially meet all best- practice criteria 2 Perform 360-degree research Perform comprehensive, 360-degree research on all candidates in the pipeline • Interview thought leaders and industry practitioners • Assess candidates’ fit with best-practice criteria • Rank all candidates Matrix positioning of all candidates’ performance relative to one another 3 Invite thought leadership in best practices Perform in-depth examination of all candidates • Confirm best-practice criteria • Examine eligibility of all candidates • Identify any information gaps Detailed profiles of all ranked candidates 4 Initiate research director review Conduct an unbiased evaluation of all candidate profiles • Brainstorm ranking options • Invite multiple perspectives on candidates’ performance • Update candidate profiles Final prioritization of all eligible candidates and companion best-practice positioning paper 5 Assemble panel of industry experts Present findings to an expert panel of industry thought leaders • Share findings • Strengthen cases for candidate eligibility • Prioritize candidates Refined list of prioritized Award candidates 6 Conduct global industry review Build consensus on Award candidates’ eligibility • Hold global team meeting to review all candidates • Pressure-test fit with criteria • Confirm inclusion of all eligible candidates Final list of eligible Award candidates, representing success stories worldwide 7 Perform quality check Develop official Award consideration materials • Perform final performance benchmarking activities • Write nominations • Perform quality review High-quality, accurate, and creative presentation of nominees’ successes 8 Reconnect with panel of industry experts Finalize the selection of the best-practice Award recipient • Review analysis with panel • Build consensus • Select recipient Decision on which company performs best against all best-practice criteria 9 Communicate recognition Inform Award recipient of Award recognition • Inspire the organization for continued success • Celebrate the recipient’s performance Announcement of Award and plan for how recipient can use the Award to enhance the brand 10 Take strategic action Upon licensing, company is able to share Award news with stakeholders and customers • Coordinate media outreach • Design a marketing plan • Assess Award’s role in future strategic planning Widespread awareness of recipient’s Award status among investors, media personnel, and employees
  • 13. BEST PRACTICES RESEARCH © Frost & Sullivan 2018 13 “We Accelerate Growth” The Intersection between 360-Degree Research and Best Practices Awards Research Methodology Frost & Sullivan’s 360-degree research methodology represents the analytical rigor of our research process. It offers a 360-degree-view of industry challenges, trends, and issues by integrating all 7 of Frost & Sullivan's research methodologies. Too often companies make important growth decisions based on a narrow understanding of their environment, leading to errors of both omission and commission. Successful growth strategies are founded on a thorough understanding of market, technical, economic, financial, customer, best practices, and demographic analyses. The integration of these research disciplines into the 360-degree research methodology provides an evaluation platform for benchmarking industry participants and for identifying those performing at best-in-class levels. About Frost & Sullivan Frost & Sullivan, the Growth Partnership Company, enables clients to accelerate growth and achieve best-in-class positions in growth, innovation and leadership. The company's Growth Partnership Service provides the CEO and the CEO's Growth Team with disciplined research and best practice models to drive the generation, evaluation and implementation of powerful growth strategies. Frost & Sullivan leverages more than 50 years of experience in partnering with Global 1000 companies, emerging businesses, and the investment community from 45 offices on six continents. To join our Growth Partnership, please visit http://www.frost.com. 360-DEGREE RESEARCH: SEEING ORDER IN THE CHAOS