© 2010 Cisco Systems, Inc. All Rights Reserved. Cisco Public 1 2010 2011 2012 2013

Total Page:16

File Type:pdf, Size:1020Kb

© 2010 Cisco Systems, Inc. All Rights Reserved. Cisco Public 1 2010 2011 2012 2013 © 2010 Cisco Systems, Inc. All rights reserved. Cisco Public 1 2010 2011 2012 2013 Who Moved My Cheese? Whyyyy The Security Industry Has Been Turned Upside Down Down Upside Upside John N. Stewart [email protected] Vice President Chief Security Officer FIRST Conference 2010 © 2010 Cisco Systems, Inc. All rights reserved. Cisco Public 2 Challenge Questions… © 2010 Cisco Systems, Inc. All rights reserved. Cisco Public 3 What is our adversary thinking… right… now… ? © 2010 Cisco Systems, Inc. All rights reserved. Cisco Public 4 5 6 Significant Security Challenge Transitions Cloud Virtualization Information Collaboration Application Security s kk Applications and Databases Ris Endpoint Security Mobility and Access Perimeter Security DtDatacen ter Cen titric Time DSTA 043010 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 7 Global Flow of Information 5 Exabytes 21 Exabytes 56 Exabytes per month per month per month 1.4 Billion DVDs 4.8 Billion DVDs 12.8 Billion DVDs crossing the Network crossing the Network crossing the Network Source: Cisco Visual Networking Index © 2010 Cisco Systems, Inc. All rights reserved. Cisco Public 8 Video Will Dominate the Information Flow Global Consumer Internet Traffic (Annual) 486 Exa by tes Video Traffic 180 Exabytes 91% ofllf all Consumer Internet Traffic will be Video 36 Exabytes in 2013 Source: Cisco Visual Networking Index © 2010 Cisco Systems, Inc. All rights reserved. Cisco Public 9 World of Connected Devices Total 500 Million Total 35 Billion Total 1 Trillion 1/10th of a Device per 5 Devices per 140 Devices per Person on Earth Person on Earth Person on Earth Source: Forrester Research, Cisco © 2010 Cisco Systems, Inc. All rights reserved. Cisco Public 10 World of Applications TOTAL iPHONE APPS MOBILE APPS APPS ALONE WORLDWIDE Source: Apple, Windows Mobile, Cisco Analysis (Forecast of 2013 assuming consistent growth trends) © 2010 Cisco Systems, Inc. All rights reserved. Cisco Public 11 Increase in Security Threats 624, 000 2, 600, 000 5, 700, 000 (projected) Source: Symantec and Cisco Analysis © 2010 Cisco Systems, Inc. All rights reserved. Cisco Public 12 And Beyond… PEOPLE TO PEOPLE THINGS TO THINGS High-Bandwidth Pipes Low-Bandwidth and Low-Power Rich/Real-Time Interaction Wireless Sensors Everywhere Enabling Media Experiences Non-Stop Flow of Data “SmartGrid is the “Video is the killer app” anc ho r use case” Business Internet Consumer Internet Industrial Internet © 2010 Cisco Systems, Inc. All rights reserved. Cisco Public 13 14 Asymmetric Problems in Assurance… Expensive To Protect, Trivial To Shake Confidence . WdWe spend an amaz ing amount protecting, and it is trivial to circumvent . Complexity is the enemy, and the opportunity . Our adversaries use our practice against us, especially when it is fixed © 2010 Cisco Systems, Inc. All rights reserved. Cisco Public 15 Technology Integration Is Complex Virus Scanning - Host & Server Vulnerability Scan Risk Management Physical Security Alerts SitSecurity Network Intrusion Compliance Protection Validation Unintentional Virus Loss Anomaly Detection Outbreak Access Control & &Miti& Mitiga tion Theft Video Surveillance DDoS Event Logging Endpoint Application Security Vulnerability Router/Switch Assessment One-Time Security Token Software Loss of Website Confidentiality Defacement Facility VPN Management User Transaction Firewall Security Manage m en t Application Multifunction Optimization Security Identity Application Management Security © 2010 Cisco Systems, Inc. All rights reserved. Cisco PublicEncryption Software 16 40,000 Routers on Cisco’ ssnetwork network © 2010 Cisco Systems, Inc. All rights reserved. Cisco Public 17 Network Layers are Complex © 2010 Cisco Systems, Inc. All rights reserved. Cisco Public 18 Hosts are Complex © 2010 Cisco Systems, Inc. All rights reserved. Cisco Public 19 Data is Complex 2,000,000 Higgyhly tuned IDS alerts per da y © 2010 Cisco Systems, Inc. All rights reserved. Cisco Public 20 “Traditional” Practice Is Losing Effectiveness www.shadowserver.org/ 14 June 2010 ~10 million new hashed binaries in 2010 to date; ~70 million total seen © 2010 Cisco Systems, Inc. All rights reserved. Cisco Public 21 Where we are good is not what we need Areas of Strength Today: Network and Device Security CSA Credent Device Security Altiris AV Application and Audit Audit Platf orm S ecurit y Service Security XML GW XML GW Data Security Email Encryption PGP NtNetwor k and Logging Logging Monitoring AD LDAP System Management Logging Logging Alerting Netwo rk Se rvices Cisco Network FW IDS DLP VPN …. © 2010 Cisco Systems, Inc. All rights reserved. Cisco Public 22 Web Security – The Data Malicious Transactions Blocked . 600,000+ including: Malware downloads Browser hijacking software Unwanted advertisement software Botnet check-ins Troj(bkd)jan (backdoor) connec tions . Average response to client = 1.4 seconds . Average daily log data = 9Gb . Average a llowe d we b transac tions passe d = 500K/60 m inu tes Top 10 Blocked Web-based Top Malware Threats blocked Top 10 Blocked Domains Reputation Scoring © 2010 Cisco Systems, Inc. All rights reserved. Cisco Public 23 And Data is Moving Measure Manage Secure SlScale Sec Arch 061710 © 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential 24 © 2010 Cisco Systems, Inc. All rights reserved. Cisco Public 25 The best way to predict the future is to invent it. --Alan Kay © 2010 Cisco Systems, Inc. All rights reserved. Cisco Public 26 Ask The Right Questions You Get What You Measure, No Matter What Always question what you are doing – some things have declining investment and results Stop asking for best practices – start asking “what’s effective and how effective is it?” What can I see, what don’t I know, how will I know it when I need to? What can I shamelessly copy from someone else? © 2010 Cisco Systems, Inc. All rights reserved. Cisco Public 27 See, Don’t Feel – Analyze Data Removes Emotion Understanding / Strategy / Hosting Net Team SecOps Others Action Information Event / Behavior Network Analysis System Analysis Correlation Security Vendor Others Identity Geo Proximity Homegrown Location Apps Data Sensor SCADA Others Logs “I have a series of questions, and the data gives the answers” ~ or ~ “I don’t know the questions yet; let’s look at the data” © 2010 Cisco Systems, Inc. All rights reserved. Cisco Public 28 A Trend is Emerging… Trusted System or Service Trusted Platform Software Supply Chain Independent • Authentication Assurance Security Product • Trojan Prevention • Threat Modeling • Preferred Suppliers CtifitiCertification • Strong Identity • Identity Assurance • Secure Logistics • Standards-Based • Secure Storage • Safe Libraries • Mutually Recognized • Monitoring • Run-Time Defenses • Hardware Assurance • Static Analysis • Security Defect Triage and Resolution • Compliance and Vulnerability Testing © 2010 Cisco Systems, Inc. All rights reserved. Cisco Public 29 My Responses The Hard Work… Has Just Begun Manual Automated Borders Everywhere Unknown Known/Assured © 2010 Cisco Systems, Inc. All rights reserved. Cisco Public 30 Enterprise Security Architecture Framework Alternate “Trusted Device Identity Storage Device Security Devices” & Access Platforms External Audit Inspection e ent Application and Personaent Mgmt Functionality Vehicles Platform c c m m m Service Security m Strong Orchestration Data Security Authentication Engines Classification ernan nage nage v Reggyulatory Data-Centricv a a a Data-Centrica Data Security Identity “Awareness” Policy Service Catalog Policy Cross-Product Library/Filters vice M ata Go Access Controlntity M Location rr NkNetwork and ee Data/Svc Contexting DD System Mgmnt Common Tracking Id Admin ExternalSe Framework Provisioning Cross-Product Capabilities Policy Engines IEN Policy Network Cisco Network Data “Tagging” Capabilities Enforcement Services © 2010 Cisco Systems, Inc. All rights reserved. Cisco Public 31 High-Level Targets Identity Management • Service opportunity for BUs • STBU SAML exploration • WebEx identityyp service concept • External identity architecture • External identity SOR • Standards for identity “realms” Data Governance • Explore encryption gateway • SSBU DLP capabilities • PMBU policy enhancements • External compliance effort • Introduce inspection capabilities Service Management • Update policy, RFIs, SLAs, SOWs • ACS/Positron integration (policy management) • NMTG data tagging/CMS integration • Security product integration with service mgmt • Develop portfolio of “Just Good Enoughs” (JGE) • Data model enhancements • Introduce regulatory capture © 2010 Cisco Systems, Inc. All rights reserved. Cisco Public 32 Future Client Platform Environment • Compliance • Management • Enforcement • Remediation Trusted layer Managed Platform Virtualized Environment Network Environment © 2010 Cisco Systems, Inc. All rights reserved. Cisco Public 33 Key Takeaways . Conclusions This Phase is Different Big changes are having a profound aaectosecutyffect on security “Know thyself” - attain a high degree of situational awareness Ask the right questions to get the right answers Look to the data to point the way © 2010 Cisco Systems, Inc. All rights reserved. Cisco Public 34 More Information Security Education Security Intelligence Operations www.cisco.com/go/securityeducation www.cisco . com/security Security Blog blogs.cisco.com/security 2009 Security Annual Report www.cisco.com/go/securityreport © 2010 Cisco Systems, Inc. All rights reserved. Cisco Public 35 © 2010 Cisco Systems, Inc. All rights reserved. Cisco Public 36.
Recommended publications
  • Guide to MBA Recruitment in The
    Guide to MBA Recruitment in the Top 100 IT Companies EXAMPLE ENTRIES September 2018 Workmaze Limited 3 William House Rayne Road Braintree Essex CM7 2AA UK. Registered in England: Company Registration No. 4100091 VAT No. 766 486 087. ©2018 Workmaze Ltd A-Z Index of Companies Click on the company name to COMMUNICATIONS COMPUTERS & DISTRIBUTORS SERVICES TELECOMMUNICATIONS be taken to the individual EQUIPMENT PERIPHERALS company entry. Please note: all CDW Accenture AT & T Inc. information was correct at time Cisco Systems Inc. Acer Group Tech Data Corp. Amazon.com Inc. Aronson Security Group of publication. Ericsson Apple Inc Applied Materials Inc. BT Group plc Harris Corp Arrow Electronics INTERNET Automatic Data Processing China Mobile Ltd KDDI Corp. Agilent Technologies Cognizant Technology Deutsche Telekom L3 Technologies Inc. Au Optronics TD Ameritrade Holdings CA Technologies Telefónica O2 Europe plc Motorola BenQ eBay Inc. FIS Mobile Telesystems Nokia Canon Inc Google IBM NII Holdings Qualcomm Inc. Capgemini Oath Infosys Technologies NTT DOCOMO Sagemcom Casio Orange SAIC Sanmina-SCL UTStarcomm Inc. Compal Electronics SoftBank Unisys Sprint Dell Technologies Wipro Technologies Tele2 AB Fujitsu SEMI-CONDUCTORS Telefonica HP Inc SOFTWARE Telia Company Hitachi Consulting Advanced Micro Devices Verizon Communications Hon Hai Precision ASE Technology Activision Blizzard Vodafone Innolux Corporation Advantest Corp. Adobe Systems WIND Hellas Telecomm Jabil Circuit Amphenol Amdocs Ltd Xerox Corp. Lenovo Analog Devices Autodesk Inc. Longsys (Shenzen) Flex DXC Technology Lexmark International Intel Electronic Arts LG Electronics MediaTek Intuit NEC NovaTek McAfee Quanta Computer Texas Instruments Microsoft Corporation Samsung Electronics United Microelectronics Oracle Corp. Sharp Symantec Corporation Seagate Toshiba TPV Technology Western Digital Workmaze Limited 3 William House Rayne Road Braintree Essex CM7 2AA UK.
    [Show full text]
  • IEEE 802.3Da SPMD TF Meeting May 19, 2021 Prepared by Peter Jones
    IEEE 802.3da SPMD TF meeting May 19, 2021 Prepared by Peter Jones Presentations posted at: https://www.ieee802.org/3/da/index.html Agenda/Admin - Chad Jones All times in Pacific Time (PT) 7:01am: The Chair reviewed the agenda in https://www.ieee802.org/3/da/public/051921/8023da_agenda_051921.pdf. The Chair asked if there were any corrections or additions to the agenda. There being no corrections or additions, the agenda stands approved. The Chair asked if anyone hasn’t had a chance to review the minutes for April 21, 2021. None responded. The Chair asked if there were any change to be made to the April 21, 2021 minutes. None responded. The April 21, 2021 minutes were approved by unanimous consent. 7:09am: Call for patents was made, no one responded. 7:14am: opening agenda slides complete. The meeting moves on to presentations. Presentations/Discussion. 7:14am: LTspice Model Validation Chris DiMinico, MC Communications/PHY-SI LLC/SenTekse/Panduit Bob Voss, Panduit Paul Wachtel, Panduit 7:21am: presentation done, start of Q&A. 7:30am: Q&A done. 7:30am: Startup sequence Michael Paul, ADI 8.05am: presentation & Q&A done. 8:05am: Editors comments George Zimmerman, CME Consulting/various 8:28am: Closing remarks Next meeting: May 26, 2021 , 7:00am PT. Meeting closed – 8:31am PT Attendees (from Webex + emails) Name Employer Affiliation Attended 05/19 Alessandro Ingrassia Canova Tech Canova Tech y Anthony New Prysmian Group Prysmian Group y Bernd Horrmeyer Phoenix Contact Phoenix Contact y Bob Voss Panduit Corp. Panduit Corp. y Brian Murray Analog Devices Inc.
    [Show full text]
  • A Content Analysis of Consumer Technology Corporate Blogs As Interactive Public Relations Tools
    A Content Analysis of Consumer Technology Corporate Blogs as Interactive Public Relations Tools A Senior Project presented to the Faculty of the Journalism Department California Polytechnic State University, San Luis Obispo In Partial Fulfillment of the Requirements for the Degree Bachelor of Science by Jayne Scuncio June, 2010 © Jayne Scuncio 1. Research Question 3 2. Introduction 4 3. Research Summary 7 3.1 Two-Way Symmetrical Model of Public Relations 7 3.2 Dialogic Communication Theory and Blogs 7 3.3 Definition of a Blog 9 3.4 Blogs as Public Relations Tools 11 4. Research Methodology 14 4.1 Navigation Tools 17 4.2 Multimedia Tools 17 4.3 Communication Tools 18 5. Discussion 20 5.1 Navigation Tools 21 5.2 Multimedia Tools 24 5.3 Communication Tools 27 6. Conclusion 32 7. Works Cited 34 8. Appendix 36 8.1 Photographs of Blogs Analyzed 36 8.1.1 Amazon.com 36 8.1.2 Cisco Systems 36 8.1.3 Dell 37 8.1.4 eBay 37 8.1.5 Google 38 8.1.6 Hewlett Packard 38 8.1.7 Intel 39 8.1.8 Microsoft 39 8.1.9 Oracle 40 8.1.10 Xerox 40 Scuncio 2 1. Research Question Do technology related companies implement all possible features in their corporate blogs, eliciting interactivity in the attempts to positively affect their relationships with publics? Scuncio 3 2. Introduction Since the advent of the mainstream Internet in the 1990’s, communication and interactivity have flourished. Euromonitor International (2009) found there were 227,219,000 Internet users in the United States in 2009—connecting with others around the world.
    [Show full text]
  • Comcast Expanding X1 Device Lineup with IP-Only Client, Next-Gen Gateway
    Comcast Expanding X1 Device Lineup With IP-Only Client, Next-Gen Gateway By: Jeff Baumgartner The evolution of Comcast’s X1 video platform continues to take shape as the operator begins to introduce a small IP-only client device and moves forward with the development of a next-generation gateway device that can anchor the service. Comcast confirmed last week that it has begun to roll out the Xi3, an all-IP HD video client for the X1 platform, in select markets around the country. A Comcast official said the MSO is deploying the new Pace-made device slowly in a number of unidentified markets, and added that Comcast expects the device to become “widely available across our footprint in Q1 or Q2 of next year.” The X1 platform is currently being anchored by the XG1, a hybrid (MPEG/IP) HDDVR that Comcast is sourcing from Arris and Pace. The new Xi3 model will serve as a multi-room companion to XG1 and work with Comcast’s new Cloud DVR product. Postings on the DSL Reports message board also turned up evidence that Cisco Systems is among the suppliers working on a new version of an X1 gateway called the XG2. A Comcast official confirmed that the image is a rendering of a future iteration of the XG1 gateway, but declined to detail the technical specs or when Comcast expected to make it available. A person familiar with the initiative said that iteration is a headed gateway that won’t feature internal DVR storage, meaning it will likely work with Comcast’s Cloud DVR or support attached storage.
    [Show full text]
  • Marvell to Buy Cavium for $6B
    Deal of the Week: Marvell to Buy Cavium for $6B Announcement Date November 20, 2017 Acquirer Marvell Technology Group Ltd. (NASDAQ: MRVL) Acquirer Description Designs, develops, and markets analog, mixed‐signal, digital signal processing, and embedded and standalone integrated circuits, with market segments including the enterprise, cloud, automotive, industrial and consumer markets Founded in 1995 and headquartered in Hamilton, Bermuda Acquirer Financial Mkt Cap: $11.8 billion LTM EBITDA: $502.8 million Statistics EV: $7.5 billion LTM EV / Revenue: 3.1x LTM Revenue: $2.4 billion LTM EV / EBITDA: 14.9x Target Company Cavium, Inc. (NASDAQ: CAVM) Target Description Designs, develops, and markets semiconductor processors for intelligent and secure networks in the United States and internationally Offers processor and board level products targeting routers, switches, appliances, storage and servers Founded in 2000 and headquartered in San Jose, California Target Financial Statistics Mkt Cap: $6.1 billion LTM EBITDA: $79.4 million EV: $5.2 billion LTM EV / Revenue: 6.0x LTM Revenue: $865.9 million LTM EV / EBITDA: NM Acquirer Advisor Goldman Sachs Target Advisor Qatalyst Partners and JPMorgan Price / Consideration $6 billion Cash and stock Rationale “This is an exciting combination of two very complementary companies that together equal more than the sum of their parts,” Matt Murphy, Marvell president and chief executive, said Marvell’s main business is in chips that control hard disk drives, a market that’s no longer
    [Show full text]
  • Portfolio of Investments
    PORTFOLIO OF INVESTMENTS Columbia Seligman Premium Technology Growth Fund, September 30, 2020 (Unaudited) (Percentages represent value of investments compared to net assets) Investments in securities Common Stocks 98.9% Common Stocks (continued) Issuer Shares Value ($) Issuer Shares Value ($) Communication Services 11.0% Information Technology 84.3% Diversified Telecommunication Services 0.5% Communications Equipment 3.3% AT&T, Inc. 52,600 1,499,626 Arista Networks, Inc.(a) 7,900 1,634,747 (a) Ooma, Inc. 20,387 266,050 Cisco Systems, Inc. 54,800 2,158,572 Total 1,765,676 CommScope Holding Co., Inc.(a) 141,900 1,277,100 Entertainment 1.7% F5 Networks, Inc.(a) 24,900 3,056,973 Activision Blizzard, Inc. 63,708 5,157,163 Lumentum Holdings, Inc.(a) 9,100 683,683 Sciplay Corp., Class A(a) 60,106 974,919 Plantronics, Inc. 131,536 1,557,386 Total 6,132,082 Telefonaktiebolaget LM Ericsson, ADR 124,800 1,359,072 Interactive Media & Services 6.6% Total 11,727,533 Alphabet, Inc., Class A(a) 7,991 11,711,610 IT Services 9.2% Alphabet, Inc., Class C(a) 6,479 9,521,538 Boa Vista Servicos SA(a) 181,700 469,465 Twitter, Inc.(a) 44,381 1,974,955 DXC Technology Co. 52,100 929,985 Total 23,208,103 Fidelity National Information Services, Inc. 33,800 4,975,698 (a) Media 1.9% Fiserv, Inc. 31,900 3,287,295 Discovery, Inc., Class A(a) 186,500 4,060,105 Genpact Ltd. 52,770 2,055,391 Fox Corp., Class A 88,300 2,457,389 Global Payments, Inc.
    [Show full text]
  • Norbert Nagy System, Network, Database Engineer, IT Security
    Curriculum Vitae PERSONAL INFORMATION Norbert Nagy CCNP number: 406594169553CRDL Hermannstädter Weg 37, 64295 Darmstadt (Germany) +49 6151 8614911 [email protected] nagy-consulting.eu Skype nnorcee JOB APPLIED FOR System, Network, Database Engineer, IT security specialist WORK EXPERIENCE January 2014 IT Network Engineer Hypotheken Bank Implementing Cisco Medianet and Performance Monitoring in the Network, via cisco flexible netflow and cisco prime infrastructure 2.0. Hardware/Tools: Cisco Catalyst Switches, ISR and ASR Switches, Cisco Prime Infrastructure 2.0 01 July 2013 – 28.02.2014 IT Network Engineer Messer Information Services, Gross Umstadt Datacenter analysis, (re)design, configuration, implementation. Optimization of the Voice network. Rebuilding 2 datacenters network architecture based on cisco nexus datacentre switches. Rebuilding and optimizing Checkpoint Firewall clusters. Hardware/Tools: Checkpoint 21000 mit core XL, Cisco Nexus 7000, 5548, Cisco Catalyst 6500, vPC, MPLS, OSPF, VSS, VRF, FEX, Policy based routing, troubleshooting 05 Sept 2013 – 30. Sept 2013 IT Network Engineer Robert Bosch GmbH, Stuttgart Design and Implementation in 2 Datacenters with 3 level firewall protection. (Internet, VPN and partners). Firewall clustering and VPN load balancing with Cisco ASA Firewalls. Routing and Switching with Cisco Catalyst und ASR devices. Central Radius and Tacacs+ authentication with Cisco ACS 5. Network interconnect between the 2 corporate networks. Project has been finished, because the migration has been finished. Hardware/Tools: Cisco Catalyst 6500, 3750, Cisco ASR 1000 series Routers, Cisco Blade Center Swtiches, MPLS, OSPF, VRF, ASA 5525X, 5545X, Troubleshooting, Ipsec and SSL VPN, NAT, Cisco ACS 5.3 Nagy-consulting.eu Page 1 / 7 Curriculum Vitae 01 April 2013 – 31.
    [Show full text]
  • Cisco Model DPC3941T DOCSIS 3.0 24X4 Wireless Residential Voice Gateway User Guide
    TP- 00102 Cisco Model DPC3941T DOCSIS 3.0 24x4 Wireless Residential Voice Gateway User Guide Please Read Important Read this entire guide. If this guide provides installation or operation instructions, give particular attention to all safety statements included in this guide. Notices Trademark Acknowledgments Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. To view a list of Cisco trademarks, go to this URL: www.cisco.com/go/trademarks. DOCSIS is a registered trademark of Cable Television Laboratories, Inc. EuroDOCSIS, EuroPacketCable, and PacketCable are trademarks of Cable Television Laboratories, Inc. The Wi-Fi Protected Setup mark is a mark of the Wi-Fi Alliance. Wi-Fi Protected Setup is a trademark of the Wi-Fi Alliance. Other third party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a partnership relationship between Cisco and any other company. (1110R) Publication Disclaimer Cisco Systems, Inc. assumes no responsibility for errors or omissions that may appear in this publication. We reserve the right to change this publication at any time without notice. This document is not to be construed as conferring by implication, estoppel, or otherwise any license or right under any copyright or patent, whether or not the use of any information in this document employs an invention claimed in any existing or later issued patent. Disclaimer The maximum performance for wireless is derived from IEEE Standard 802.11 specifications. Actual performance can vary, including lower wireless network capacity, data throughput rate, range and coverage.
    [Show full text]
  • Cisco Unified Callconnector for Microsoft Dynamics CRM
    Data Sheet Cisco Unified CallConnector for Microsoft Dynamics CRM Cisco® Unified Communications is a complete IP communications system of voice, video, data, and mobility products and applications. It brings together all your voice and data communication onto a single network, to help you serve customers better, be more productive, and keep costs under control. Cisco Unified Communications brings people together by enabling a new way of communicating – where your business moves with you, network security is solid, and information is always available... whenever and wherever it is needed. Cisco Unified Communications is part of an integrated solution that includes network infrastructure, security, mobility, and network management products. Lifecycle services, flexible deployment and outsourced management options, end-user and partner financing packages, and third-party communications applications complete the solution. Cisco Unified CallConnector for Microsoft Dynamics CRM™ (customer relationship management) lets you deliver customer information to the computer screen of any customer-facing employee – the instant the customer calls. This free middleware application is part of the Cisco Unified Communications family. It integrates Cisco Unified Communications Manager Express (formerly known as Cisco Unified CallManager Express), Cisco Unified Communications Manager (formerly known as Cisco Unified CallManager), and Cisco Unified Contact Center Express with Microsoft Dynamics CRM 4.0. It empowers your employees with a complete view of customers, so they can deliver more informed, responsive service. Cisco Unified CallConnector for Microsoft Dynamics CRM Overview ! Quick and easy integration with Microsoft Dynamics CRM 4.0. ! Customer contact information displayed in Extensible Markup Language (XML) for any capable Cisco Unified IP Phones within the network – The XML lookup service allows lookup of any Microsoft Dynamics CRM contact to view account information with the option to dial the contact.
    [Show full text]
  • Alexandre Mandl Account Manager - Amazon Web Services # Helping Customers with the Journey to the Cloud # [email protected]
    Alexandre Mandl Account Manager - Amazon Web Services # Helping customers with the journey to the cloud # [email protected] Summary I’m a Tech Minded sales leader with a passion for business. EXPERTISE #Multicultural business environment#Sales#Business Development#Cloud Computing Having worked for different companies like Cisco, Red Hat and Brazilian integrators in the past 10 years, I discovered that the thing I love most about my job is the possibility to work and strength my relationship skills on a wide variety of corporate markets. From financial, e-commerce, retail, media to health firms, small to large companies, local to global customers, each project required not only a unique mix of creativity, innovation and technical skills but also a deep research of customer needs at particular times. The success of my winning commercial proposals were built on a highly focused team management plan, engaging technical experts, colleagues, superiors, post sales and partner’s ecosystems for the single purpose to serve well my customers by a great relationship. Mastering a good combination of IT, Sales and Negotiation skills made me land at Amazon Web Services Brazil during their start-up phase in 2012. As an Account Manager I’ve developed, penetrated, increased market share in many verticals by helping CIOs/CEOs from the Commercial area of Brazil and Latin American countries on the journey to the cloud. The success formula is the same simple one I used at my previous jobs: listen, understand and engage. Many companies are currently using advanced cloud/IT technologies, creating innovative and disruptive business and I’m glad that they let me be part of it and share their cases.
    [Show full text]
  • 12-786 Brief for Google, Inc.; Cisco Systems, Inc.; Ebay Inc.; Facebook
    No. 12-786 IN THE Supreme Court of the United States ———— LIMELIGHT NETWORKS, INC., Petitioner, v. AKAMAI TECHNOLOGIES, INC., ET AL., Respondents. ———— On Writ of Certiorari to the United States Court of Appeals for the Federal Circuit ———— BRIEF OF GOOGLE, INC.; CISCO SYSTEMS, INC.; EBAY INC.; FACEBOOK, INC., MICRON TECHNOLOGY, INC.; NETFLIX, INC.; ORACLE CORPORATION; RED HAT, INC; SAP AMERICA INC; SAS INSTITUTE INC.; VIZIO, INC.; XILINX, INC.; YAHOO! INC. AS AMICI CURIAE IN SUPPORT OF PETITIONER ———— KATHLEEN M. SULLIVAN Counsel of Record DAVID PERLSON QUINN EMANUEL URQUHART & SULLIVAN, LLP 51 Madison Avenue, 22nd Floor New York, NY 10010 (212) 849-7000 kathleensullivan@ quinnemanuel.com Counsel for Amici Curiae March 3, 2014 WILSON-EPES PRINTING CO., INC. – (202) 789-0096 – WASHINGTON, D. C. 20002 TABLE OF CONTENTS Page TABLE OF AUTHORITIES ................................ INTERESTS OF AMICI CURIAE ...................... 1 SUMMARY OF ARGUMENT ............................. 6 ARGUMENT ........................................................ 7 I. The Federal Circuit Decision Conflicts With The Patent Statute And Prior Decisions of This Court ............................. 7 A. The Federal Circuit Decision Conflicts With The Patent Act ............ 8 B. The Decision Conflicts With This Court’s Precedents ............................... 9 II. The Akamai Rule Places Large and Unwarranted New Burdens on Participants In Information Technology Markets ..................................................... 10 A. The Akamai Rule Invites Expansive
    [Show full text]
  • Portfolio of Investments
    PORTFOLIO OF INVESTMENTS Columbia Seligman Premium Technology Growth Fund, Inc., March 31, 2021 (Unaudited) (Percentages represent value of investments compared to net assets) Investments in securities Common Stocks 98.5% Common Stocks (continued) Issuer Shares Value ($) Issuer Shares Value ($) Communication Services 9.7% Information Technology 84.0% Entertainment 1.4% Communications Equipment 5.5% Activision Blizzard, Inc. 59,508 5,534,244 Arista Networks, Inc.(a) 13,996 4,225,252 (a) Sciplay Corp., Class A 81,606 1,320,385 Cisco Systems, Inc. 27,100 1,401,341 Total 6,854,629 CommScope Holding Co., Inc.(a) 119,600 1,837,056 Interactive Media & Services 6.3% F5 Networks, Inc.(a) 28,700 5,987,394 Alphabet, Inc., Class A(a) 8,041 16,584,724 Lumentum Holdings, Inc.(a) 59,900 5,471,865 Alphabet, Inc., Class C(a) 6,629 13,712,948 Plantronics, Inc.(a) 174,938 6,806,838 Match Group, Inc.(a) 8,000 1,099,040 Telefonaktiebolaget LM Ericsson, ADR 123,300 1,626,327 Total 31,396,712 Total 27,356,073 Media 1.4% IT Services 7.5% Discovery, Inc., Class C(a) 41,300 1,523,557 DXC Technology Co.(a) 53,000 1,656,780 Fox Corp., Class A 142,700 5,152,897 Fidelity National Information Services, Inc. 34,400 4,836,984 Total 6,676,454 Fiserv, Inc.(a) 31,600 3,761,664 Wireless Telecommunication Services 0.6% Genpact Ltd. 72,670 3,111,730 T-Mobile USA, Inc.(a) 6,200 776,798 Global Payments, Inc.
    [Show full text]