{"id":740,"date":"2006-03-01T00:00:00","date_gmt":"2006-03-01T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2006\/03\/01\/locking-in-network-security\/"},"modified":"2021-12-30T11:38:05","modified_gmt":"2021-12-30T11:38:05","slug":"locking-in-network-security","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2006\/03\/01\/locking-in-network-security\/","title":{"rendered":"Locking In Network Security"},"content":{"rendered":"<p>When Cisco first launched into network security, its Self-Defending Network (SDN) strategy sounded more like a wishful marketing pitch than reality.   To wit, up until this year it was received with a mixture of skepticism and optimism.  But with the slow and steady acquisitions of security vendors and updates to its existing products, Cisco&#8217;s SDN strategy is coming of age quickly despite ongoing challenges to its hegemony from competitors such as Avaya and Juniper Networks.  The proliferation of viruses, worms, malware, denial-of-service attacks and other threats have made security a top priority for companies connected to the Web.  &#8220;SDN still has a ways to go, but if you had asked me a year ago, I would have said a long way,&#8221; says Jay Kirby, vice president of sales at Troubadour, a Houston-based solution provider.  &#8220;If you&#8217;re looking at a best-of-breed [multivendor] solution, you may not have a lot of cooperation or communication when you open a support incident.&#8221;  The flip side of the integration story is that while the Cisco products do work in mixed-vendor networks, they are not based on open protocols, so other security vendors are limited in their abilities to develop their products to work with SDN.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Even with the comprehensive set of security products Juniper and Cisco have developed, integrators are still finding holes that can be filled by innovative security companies with specialized tools.<\/p>\n<p>In particular, with applications like VoIP and 802.11 wireless networks, security concerns are only starting to emerge, so the reliability of protection from attacks is very much in doubt, according to several VoIP specialists.<\/p>\n<p>VARs say they&#8217;d like to see Cisco&#8217;s SDN platform include an integrated management tool that links all the products together, and a solution for spam, content filtering and virus control, all of which are handled by third-party products with SDN.<\/p>\n<p>http:\/\/www.varbusiness.com\/showArticle.jhtml;jsessionid=QVM0ECQPSNV1WQSNDBOCKHSCJUMEKJVN?articleID=179103316<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[29],"tags":[],"class_list":["post-740","post","type-post","status-publish","format-standard","hentry","category-news"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/740","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=740"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/740\/revisions"}],"predecessor-version":[{"id":3227,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/740\/revisions\/3227"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=740"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=740"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=740"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}