\"<p>Jeetu
Jeetu Patel, executive vice president, Security & Collaboration Business Units at Cisco. <\/span><\/figcaption><\/figure>The US-based telecom networking company is bullish about its security portfolio, and said that unlike its competitors, it has a broadest offering built on the capabilities of companies it acquired over time. In an interaction with ETTelecom’s Muntazir Abbas, Jeetu Patel<\/a>, executive vice president, Security & Collaboration Business Units<\/strong> at Cisco<\/a><\/strong> speaks on security landscape, integrated platforms, OpenRAN, and 5G-centric networks. Edited excerpts.

As more workforce is moving towards hybrid work culture, mobile phone is a new and evolving device that we are seeing across sectors. So what exactly are your offerings considering security landscape?<\/strong>

Regardless of which device you're on, we should provide endpoint protection, and we should also provide network security, and secured connectivity. The way to think about our security offering is in two major buckets, a bunch of things that we will do to prevent the organization from having a breach. As you know, security is about minimizing the risk of having a breach, you cannot eliminate it. So when you do have a breach, and when someone does come into your environment, how can you make sure that you prevent lateral movement of that, that that that truck in the environment as well. So we've got a threat intelligence platform with Talos that allows us to detect, respond to, and immediate threats, if there is, in fact, a breach that does occur. So both of those sides are pretty important. And the beauty is, regardless of the control point that you might have user device network with the application, we actually have solutions across all of those. So expect us to continue to keep investing that over and over.

How many companies have you acquired in the industry over the last five years in the security domain? Can you just name them?
<\/strong>
We acquired Sourcefire, Duo, and Kenna security most recently. There are a fair number of companies in the security space that we have acquired. The key is not how many acquisitions we have had. We acquired Meraki as well. But the beauty about security is that we are actually tying networking and security together. So the NetOps person and the SecOps person can now go out and from the same dashboard, manage their environment, from the same dashboard set policies, whether it be a networking policy or a security policy.

With 5G taking the centerstage and a lot of enterprises looking at 5G private, especially when we talk about India and other developing countries, how you are preparing to provide support to them and deploy foolproof networks?
<\/strong>
So from a security standpoint, we will make sure that the security can be layered on top of any network connectivity that you might have. And so and then we will make sure that we provide the way that the controls can be applied and the management happens. It should be something that's done in a unified way across networking and security. But if you have a 5G connection, we can still layer on, you know, secure connectivity and continuous trusted access and zero trust will be things that could apply because in hybrid work people connect from any connection, from any location on any device to any application, whether it's action or transaction. And that's how this service has been built. It's a cloud-based multi-tenant service that can steer the traffic to any multi-cloud. It is a kind of provider that is able to have a unified policy engine and make sure that the policy dashboard can span personas over time.

Do you agree that integration between security and networking is one of the critical aspects?<\/strong>

It’s the main thing. Our goal is to make sure that one of the things that Cisco has always had very rich technology. But sometimes, what has happened is not all of our technology works seamlessly well with each other. In some cases, it's something that we prioritize because we want to make sure that we even enhance our competitors’ products.

Can you say that by far, you have the broadest portfolio in the market?<\/strong>

If you think about not only the broadest portfolio, there's a huge business model advantage as well that we don't have conflicts of interest. So there are three major kinds of groups of companies that are insecure that we see. So one of them is the point solution providers that they might have a very specific solution for something that's on one side. On the other side, the cloud providers like
Microsoft<\/a>, Amazon or Google<\/a>, and they have some security capabilities. And then the third one, there are these integrated platforms that are starting to get, you know, and from the point solution providers, you have to buy a bunch of those individually.

Read also<\/h4>
<\/a><\/figure>
Cisco seeks to deliver smarter networks with unified IT experience through cloud<\/a><\/h5><\/div>
<\/a><\/figure>
Cisco eyes to support outcome-driven private 5G<\/a><\/h5><\/div>
<\/a><\/figure>
Cisco wins reversal of $2.75 bln damages award because judge&#39;s wife owned stock<\/a><\/h5><\/div>
<\/a><\/figure>
Cisco to launch 5G-as-a-service soon<\/a><\/h5><\/div><\/div><\/div>
Someone like Microsoft might have the breadth, but what they don't have is the multi-cloud aspect, as well as we would. And because we have a business model of neutrality, where we can go out and work with any of the power players. And then you have the integrated platforms that are starting to emerge as innovative platforms, you take a look at
Palo Alto Networks<\/a>, CrowdStrike, or Zscalar. But they don't have the breadth of the portfolio we have. And so that's the way we do and we are able to differentiate the market because of our scale, because of our breath because of our multi-cloud neutrality. You know, all of these things really help us in fundamentally differentiating from the others in the market because of our networking heritage. And then we also have a massive distribution that allows us to take this to multiple different industries and different sizes of companies.

So do you think the security landscape is different or is no different when it comes to OpenRAN network?
<\/strong>
There are some tenants that you have to keep in mind, they're going to be multi-cloud, they're going to be cloud-native, they're going to be zero trust enabled, with least privileged access, they will be continually assessed for granting trust, from a risk-based perspective, where you will constantly assess someone's behaviour be able to grant trust dynamically. They will have to keep in mind privacy, they will prevent for any kind of lateral movement if a breach does happen.

You know, all of those things are core design goals, it will be very much AI and machine learning-based so that you can infer, based on correlation, if or not, there's going to be a breach that's going to occur in the future. Those are aspects that have to be kept. And there'll be an open API, which is extensive and is going to provide extensibility. Those in my mind are the core tenants that you think about. And in addition to that, you are going to try to make it more and more unified from a policy engine perspective, and a management dashboard perspective as well.
<\/body>","next_sibling":[{"msid":92537168,"title":"Sony accelerates PC gaming push with Inzone gear","entity_type":"ARTICLE","link":"\/news\/sony-accelerates-pc-gaming-push-with-inzone-gear\/92537168","category_name":null,"category_name_seo":"telecomnews"}],"related_content":[],"msid":92538365,"entity_type":"ARTICLE","title":"Scale of our security portfolio differentiate us from rivals: Cisco","synopsis":"'We acquired Sourcefire, Duo, and Kenna security most recently. There are a fair number of companies in the security space that we have acquired. The key is not how many acquisitions we have had. We acquired Meraki as well. But the beauty about security is that we are actually tying networking and security together.'","titleseo":"telecomnews\/palo-alto-networks-crowdstrike-zscalar-portfolio-not-scaleable-cisco-executive","status":"ACTIVE","authors":[{"author_name":"Muntazir Abbas","author_link":"\/author\/479234376\/muntazir-abbas","author_image":"https:\/\/etimg.etb2bimg.com\/authorthumb\/479234376.cms?width=100&height=100","author_additional":{"thumbsize":true,"msid":479234376,"author_name":"Muntazir Abbas","author_seo_name":"muntazir-abbas","designation":"Editor","agency":false}}],"analytics":{"comments":0,"views":1070,"shares":0,"engagementtimems":3393000},"Alttitle":{"minfo":""},"artag":"ETTelecom","artdate":"2022-06-29 12:38:45","lastupd":"2022-06-29 13:58:56","breadcrumbTags":["Cisco","microsoft","google","Telecom equipment","Palo Alto Networks","Jeetu Patel","Cisco Systems","5G networks","Prime","Interviews"],"secinfo":{"seolocation":"telecomnews\/palo-alto-networks-crowdstrike-zscalar-portfolio-not-scaleable-cisco-executive"}}" data-authors="[" muntazir abbas"]" data-category-name="" data-category_id="" data-date="2022-06-29" data-index="article_1">

我们的安全投资组合规模区分我们和竞争对手:思科

“我们收购Sourcefire,二,Kenna安全最近。有相当多的公司在安全领域,我们有。关键不是我们有多少收购。我们也获得了Meraki。但美女对安全是我们实际上是把网络和安全在一起。”< / p >

Muntazir阿巴斯
  • 更新在2022年6月29日下午01:58坚持
阅读: 100年行业专业人士
读者的形象读到100年行业专业人士
<p>Jeetu Patel, executive vice president, Security & Collaboration Business Units at Cisco. </p>
Jeetu Patel,执行副总裁,安全&思科协作业务单位。
美国电信网络公司是看好其安全投资组合,并表示与竞争对手不同的是,它有一个广泛的提供建立在公司收购的能力。在一个交互ETTelecom Muntazir乐动娱乐招聘阿巴斯的Jeetu帕特尔执行副总裁,安全与业务部门的合作思科说安全格局、集成平台、OpenRAN和5 g-centric网络。编辑摘录。

随着越来越多的劳动力向混合的工作文化,手机是一个新的和不断发展的设备,我们看到各部门。那么什么是你的产品考虑安全景观?

广告
不管你在这设备,我们应该提供端点保护,我们还应该提供网络安全,安全连接。考虑我们的安全提供的方法是在两个大水桶,一堆的事情,我们将做防止组织破坏。如你所知,安全是最小化有违约的风险,你无法消除它。所以当你有违反,当有人进入你的环境,你怎么能确保你避免横向运动,卡车的环境。所以我们有一个威胁情报平台允许我们探测到的塔洛斯,回应,和立即的威胁,如果有,事实上,发生的违反。所以这两个方面是非常重要的。美是,不管控制点,你可能与应用程序用户设备网络,我们在所有这些解决方案。所以希望我们继续投资。

你获得多少公司在业界在过去五年安全域?你能说出他们吗?

二,我们获得Sourcefire和Kenna安全最近。有相当多的公司在安全领域,我们有。关键不是我们有多少收购。我们也获得了Meraki。但美女对安全是我们实际上是把网络和安全在一起。所以NetOps人和SecOps人现在可以从相同的仪表板,走出去,管理他们的环境,同样的仪表板设置政策,无论是网络政策或一个安全策略。

广告
5 g的出现,很多企业看5克私人的,特别是当我们谈论印度和其他发展中国家,如何正准备向他们提供支持和部署简单网络吗?

从安全的角度来看,我们将确保安全可以分层的任何网络连接,你可能有。然后我们将确保我们提供的控件可以应用和管理。应该是跨网络和安全以统一的方式进行。但是如果你有5 g连接,我们仍然可以层上,你知道,连通性和持续安全可靠的访问和零信任将在混合工作可以应用的东西,因为人们从任何连接,连接任何设备上的任何位置的任何应用程序中,无论是行动或事务。这就是这个服务已经建成。这是一个基于云计算的多租户服务,可以引导流量到任何多重云。是一种提供者能够有一个统一的策略引擎,确保政策指示板可以跨角色。

你同意之间的集成安全和网络是至关重要的一个方面?

这是最主要的。我们的目标是确保思科的一件事总是有非常丰富的技术。但有时,发生了什么事并不是我们所有的技术无缝地工作。在某些情况下,这是我们优先考虑,因为我们要确保我们甚至增强我们的竞争对手的产品。

你能说,到目前为止,你有最广泛的市场投资组合?

如果你想想不仅最广泛的投资组合,有一个巨大的商业模式优势,我们没有利益冲突。有三个主要类型的组织的公司,我们看到都是不安全的。所以其中一个是重点解决方案提供商,他们可能有一个非常具体的解决方案的东西放在一边。另一方面,云计算服务提供商微软,亚马逊或谷歌和他们有一些安全功能。然后第三个,有这些集成平台开始,你知道,从解决方案提供商,你必须单独买一堆人。

读也


像微软这样的人可能有广度,但他们没有多重云方面,以及我们会。中立,因为我们有一个商业模式,我们可以出去工作的任何球员。然后综合平台,开始成为创新的平台,你看看帕洛阿尔托网络、CrowdStrike或Zscalar。但是他们没有组合的广度。这就是我们所做的和我们能区分市场,因为我们的规模,因为我们的呼吸因为我们的多重云中立。你知道的,所有这些事情真的帮助我们从根本上区分从其他市场,因为我们的网络遗产。然后我们也有一个巨大的分布,使我们能够把这个到多个不同行业和不同规模的公司。

所以你认为安全景观是不同的或没有什么不同OpenRAN时网络?

有些租户,你必须记住,他们是多重云,他们会进行,他们将是零信任启用,最小特权访问,他们将不断评估给予信任,从风险的角度来看,你不断地评估一个人的行为能给予信任动态。他们将不得不记住隐私,他们将阻止任何形式的横向运动如果违反发生。

你知道,这些东西都是核心设计目标,它将很大程度上基于人工智能和机器学习,这样您就可以推断出,基于相关性,如果不信,会有违反这将发生在未来。必须保持在这些方面。并且会有一个开放的API,它是广泛和提供可扩展性。这些在我看来是你思考的核心租户。,除此之外,你要让它越来越统一从策略引擎的角度来看,和管理仪表板的角度来看。
  • 发表在2022年6月29日,38点坚持
是第一个发表评论。
现在评论

加入2 m +行业专业人士的社区

订阅我们的通讯最新见解与分析。乐动扑克

下载ETTelec乐动娱乐招聘om应用

  • 得到实时更新
  • 保存您最喜爱的文章
扫描下载应用程序

\"&lt;p&gt;Jeetu
Jeetu Patel, executive vice president, Security & Collaboration Business Units at Cisco. <\/span><\/figcaption><\/figure>The US-based telecom networking company is bullish about its security portfolio, and said that unlike its competitors, it has a broadest offering built on the capabilities of companies it acquired over time. In an interaction with ETTelecom’s Muntazir Abbas, Jeetu Patel<\/a>, executive vice president, Security & Collaboration Business Units<\/strong> at Cisco<\/a><\/strong> speaks on security landscape, integrated platforms, OpenRAN, and 5G-centric networks. Edited excerpts.

As more workforce is moving towards hybrid work culture, mobile phone is a new and evolving device that we are seeing across sectors. So what exactly are your offerings considering security landscape?<\/strong>

Regardless of which device you're on, we should provide endpoint protection, and we should also provide network security, and secured connectivity. The way to think about our security offering is in two major buckets, a bunch of things that we will do to prevent the organization from having a breach. As you know, security is about minimizing the risk of having a breach, you cannot eliminate it. So when you do have a breach, and when someone does come into your environment, how can you make sure that you prevent lateral movement of that, that that that truck in the environment as well. So we've got a threat intelligence platform with Talos that allows us to detect, respond to, and immediate threats, if there is, in fact, a breach that does occur. So both of those sides are pretty important. And the beauty is, regardless of the control point that you might have user device network with the application, we actually have solutions across all of those. So expect us to continue to keep investing that over and over.

How many companies have you acquired in the industry over the last five years in the security domain? Can you just name them?
<\/strong>
We acquired Sourcefire, Duo, and Kenna security most recently. There are a fair number of companies in the security space that we have acquired. The key is not how many acquisitions we have had. We acquired Meraki as well. But the beauty about security is that we are actually tying networking and security together. So the NetOps person and the SecOps person can now go out and from the same dashboard, manage their environment, from the same dashboard set policies, whether it be a networking policy or a security policy.

With 5G taking the centerstage and a lot of enterprises looking at 5G private, especially when we talk about India and other developing countries, how you are preparing to provide support to them and deploy foolproof networks?
<\/strong>
So from a security standpoint, we will make sure that the security can be layered on top of any network connectivity that you might have. And so and then we will make sure that we provide the way that the controls can be applied and the management happens. It should be something that's done in a unified way across networking and security. But if you have a 5G connection, we can still layer on, you know, secure connectivity and continuous trusted access and zero trust will be things that could apply because in hybrid work people connect from any connection, from any location on any device to any application, whether it's action or transaction. And that's how this service has been built. It's a cloud-based multi-tenant service that can steer the traffic to any multi-cloud. It is a kind of provider that is able to have a unified policy engine and make sure that the policy dashboard can span personas over time.

Do you agree that integration between security and networking is one of the critical aspects?<\/strong>

It’s the main thing. Our goal is to make sure that one of the things that Cisco has always had very rich technology. But sometimes, what has happened is not all of our technology works seamlessly well with each other. In some cases, it's something that we prioritize because we want to make sure that we even enhance our competitors’ products.

Can you say that by far, you have the broadest portfolio in the market?<\/strong>

If you think about not only the broadest portfolio, there's a huge business model advantage as well that we don't have conflicts of interest. So there are three major kinds of groups of companies that are insecure that we see. So one of them is the point solution providers that they might have a very specific solution for something that's on one side. On the other side, the cloud providers like
Microsoft<\/a>, Amazon or Google<\/a>, and they have some security capabilities. And then the third one, there are these integrated platforms that are starting to get, you know, and from the point solution providers, you have to buy a bunch of those individually.

Read also<\/h4>
<\/a><\/figure>
Cisco seeks to deliver smarter networks with unified IT experience through cloud<\/a><\/h5><\/div>
<\/a><\/figure>
Cisco eyes to support outcome-driven private 5G<\/a><\/h5><\/div>
<\/a><\/figure>
Cisco wins reversal of $2.75 bln damages award because judge&#39;s wife owned stock<\/a><\/h5><\/div>
<\/a><\/figure>
Cisco to launch 5G-as-a-service soon<\/a><\/h5><\/div><\/div><\/div>
Someone like Microsoft might have the breadth, but what they don't have is the multi-cloud aspect, as well as we would. And because we have a business model of neutrality, where we can go out and work with any of the power players. And then you have the integrated platforms that are starting to emerge as innovative platforms, you take a look at
Palo Alto Networks<\/a>, CrowdStrike, or Zscalar. But they don't have the breadth of the portfolio we have. And so that's the way we do and we are able to differentiate the market because of our scale, because of our breath because of our multi-cloud neutrality. You know, all of these things really help us in fundamentally differentiating from the others in the market because of our networking heritage. And then we also have a massive distribution that allows us to take this to multiple different industries and different sizes of companies.

So do you think the security landscape is different or is no different when it comes to OpenRAN network?
<\/strong>
There are some tenants that you have to keep in mind, they're going to be multi-cloud, they're going to be cloud-native, they're going to be zero trust enabled, with least privileged access, they will be continually assessed for granting trust, from a risk-based perspective, where you will constantly assess someone's behaviour be able to grant trust dynamically. They will have to keep in mind privacy, they will prevent for any kind of lateral movement if a breach does happen.

You know, all of those things are core design goals, it will be very much AI and machine learning-based so that you can infer, based on correlation, if or not, there's going to be a breach that's going to occur in the future. Those are aspects that have to be kept. And there'll be an open API, which is extensive and is going to provide extensibility. Those in my mind are the core tenants that you think about. And in addition to that, you are going to try to make it more and more unified from a policy engine perspective, and a management dashboard perspective as well.
<\/body>","next_sibling":[{"msid":92537168,"title":"Sony accelerates PC gaming push with Inzone gear","entity_type":"ARTICLE","link":"\/news\/sony-accelerates-pc-gaming-push-with-inzone-gear\/92537168","category_name":null,"category_name_seo":"telecomnews"}],"related_content":[],"msid":92538365,"entity_type":"ARTICLE","title":"Scale of our security portfolio differentiate us from rivals: Cisco","synopsis":"'We acquired Sourcefire, Duo, and Kenna security most recently. There are a fair number of companies in the security space that we have acquired. The key is not how many acquisitions we have had. We acquired Meraki as well. But the beauty about security is that we are actually tying networking and security together.'","titleseo":"telecomnews\/palo-alto-networks-crowdstrike-zscalar-portfolio-not-scaleable-cisco-executive","status":"ACTIVE","authors":[{"author_name":"Muntazir Abbas","author_link":"\/author\/479234376\/muntazir-abbas","author_image":"https:\/\/etimg.etb2bimg.com\/authorthumb\/479234376.cms?width=100&height=100","author_additional":{"thumbsize":true,"msid":479234376,"author_name":"Muntazir Abbas","author_seo_name":"muntazir-abbas","designation":"Editor","agency":false}}],"analytics":{"comments":0,"views":1070,"shares":0,"engagementtimems":3393000},"Alttitle":{"minfo":""},"artag":"ETTelecom","artdate":"2022-06-29 12:38:45","lastupd":"2022-06-29 13:58:56","breadcrumbTags":["Cisco","microsoft","google","Telecom equipment","Palo Alto Networks","Jeetu Patel","Cisco Systems","5G networks","Prime","Interviews"],"secinfo":{"seolocation":"telecomnews\/palo-alto-networks-crowdstrike-zscalar-portfolio-not-scaleable-cisco-executive"}}" data-news_link="//www.iser-br.com/news/palo-alto-networks-crowdstrike-zscalar-portfolio-not-scaleable-cisco-executive/92538365">