The Enterprise Security Supersite NewsFactor Sites:       NewsFactor.com     Enterprise Security Today     CRM Daily     Business Report     Sci-Tech Today  
   
This ad will display for the next 20 seconds. Click for more information, or
Home Network Security Viruses & Malware Cybercrime Security Solutions More Topics...
Advertisement
Free Gartner Report:
Drive innovation & collaboration
with the "Everyone's IT" approach.

View the research report
Security Solutions
Is your endpoint data protected?
Average Rating:
Rate this article:  
Cisco Buys Czech Network Security Company

Cisco Buys Czech Network Security Company
By Jennifer LeClaire

Share
Share on Facebook Share on Twitter Share on Linkedin Share on Google Plus

When Cognitive Security's technology is combined with traditional firewalls, network security, content security, and intrusion detection and prevention systems, it provides a complete detection and mitigation solution that protects against advanced attacks and zero-day attacks in near real-time, said Cisco Senior Vice President Chris Young.
 


Cisco is turning up the acquisition heat early this year -- and focusing on various fronts to build out its solutions. Cisco's latest buy is in the realm of security.

Cisco just announced plans to acquire Cognitive Security, a small company in Prague, Czech Republic. Financial terms of the deal were not disclosed.

"In a world where malware and advanced cyber threats are enterprises' greatest concern, the need for innovation in security is at an all-time high," said Chris Young, senior vice president of Cisco's Security and Government Group, writing in the company blog. "Mobility and cloud are drastically changing the IT security paradigm, and our attackers are radically increasing the sophistication of their attack methods."

Analytics Play

Young went on to say that Cisco has been listening to customers' concerns and is investing in threat intelligence and defense. The Cognitive Security acquisition is part of Cisco's investment to strengthen the network with more analytics and intelligence to target complex and disruptive threats.

Cognitive Security develops products and services that work to give clients a granular view in their corporatewide network activities. This includes visibility into threats that traverse traditional network defenses, and may include sophisticated and unauthorized penetration into sensitive IT assets, targeted malware infections, or strategically motivated black hackers.

One product, Cognitive Behavior Analysis, reveals the presence of an offending intruder, the methods they are deploying, and the assets they are targeting. Security and IT administrators can then quickly identify the attackers, allowing them to take appropriate action to protect their assets.

Complete Mitigation

When Cognitive's technology is combined with traditional firewalls, network security, content security, and intrusion detection and prevention systems, Young said, it provides a complete detection and mitigation solution that helps customers protect against advanced attacks and zero day attacks in near real-time.

"Think of this simple use case: An employee's own personal device is infected outside the perimeter of the enterprise. Once the employee brings that device on to the network, the enterprise's perimeter defense solution cannot protect against the threat because the device has already been infected," Young said.

"This can cause a full range of negative impacts on the enterprise and the data center. With Cognitive's technology integrated into existing security tools, unknown abnormal network behavior is quickly and automatically identified and subjected to further analysis and enforcement."

Cisco's Clear Focus

Cisco will integrate the Cognitive Security technology into its Security Intelligence Operations. Cisco's idea is to bring together global security intelligence from the cloud with local intelligence on a customer premise to protect against advanced cyber threats.

Young said the Cognitive acquisition supports the networking giant's focus and investment in security and is integral to all three key components of the company's security strategy: cloud-based threat intelligence and defense; common policy management and context; and network enforced policy.
 

Tell Us What You Think
Comment:

Name:



Salesforce.com is the market and technology leader in Software-as-a-Service. Its award-winning CRM solution helps 82,400 customers worldwide manage and share business information over the Internet. Experience CRM success. Click here for a FREE 30-day trial.


 Security Solutions
1.   9 Norton Security Products Are Now 1
2.   Yahoo Joins Google To Encrypt E-mail
3.   CloudFlare To Offer Free Encryptions
4.   NSA Brings German Encryption Boom
5.   Google Search Promotes Safer Sites


advertisement
9 Norton Security Products Are Now 1
Symantec takes software-as-service tack.
Average Rating:
Yahoo Joins Google To Encrypt E-mail
Using new encryption techniques.
Average Rating:
NSA Brings German Encryption Boom
Snowden transformed security industry.
Average Rating:


advertisement
Product Information and Resources for Technology You Can Use To Boost Your Business

Network Security Spotlight
Researchers Find Malicious Android Apps Can Hack Gmail
A new study shows that a weakness in the Android mobile operating system can be used to steal sensitive, personal info from unwitting users. Gmail proved to be the easiest app to attack; Amazon, the hardest.
 
UPS Stores in 24 States Hit by Data Breach
Big Brown has been breached. UPS said that about 105,000 customer transactions at 51 of its UPS Store locations in 24 states could have been compromised between January and August.
 
Cost of Target Data Breach: $148 Million Plus Loss of Trust
The now infamous Target data breach is still costing the company -- and its shareholders -- plenty. In fact, the retailing giant forecast the December 2013 incident cost shareholders $148 million.
 

Enterprise Hardware Spotlight
Acer's New Desktop Box Rides the Chrome OS Wave
Filling out its Chrome OS line, Acer is following the introduction of a larger Chromebook line earlier this month with a new tiny $180 desktop Chromebox and also a smaller Chromebook.
 
Feds OK $2.3 Billion IBM-Lenovo x86 Server Deal
IBM and Lenovo are celebrating U.S. approval of their x86-based server deal, having cleared some major security hurdles. The deal makes Lenovo a major player for enterprise data centers.
 
Three New Lenovo PCs Aimed at Business Users
With businesses wanting computing solutions that do more for less money, Lenovo has unveiled three new desktop PCs that it says offer solid computing at a budget-minded price.
 

Mobile Technology Spotlight
Screen Shortage Briefly Puts Brakes on iPhone 6
RAM? Check. Antenna switch? Check. Screen? Oops. Parts suppliers for Apple have found themselves facing a shortage of screens for the new iPhone 6 as next month's release date for the new smartphone looms.
 
Bounty Offered to Coders for Oculus Rift Bugs
Coders who find bugs in software for the Oculus Rift VR immersive headset could receive a reward of at least $500 under Facebook's White Hat bounty program. Facebook acquired Oculus in March.
 
Google Glass Adds Voice Access to Phone Contacts
The latest update to Google Glass will let users access their top 20 phone contacts with voice commands alone. A user can then choose a phone call, Google hangouts, e-mail or text messaging.
 

Navigation
Enterprise Security Today
Home/Top News | Network Security | Viruses & Malware | Cybercrime | Security Solutions | Mobile Security | Disaster Recovery | Windows Security
Data Security | EST Press Releases
NewsFactor Network Enterprise I.T. Sites
NewsFactor Technology News | Enterprise Security Today | CRM Daily

NewsFactor Business and Innovation Sites
Sci-Tech Today | NewsFactor Business Report

NewsFactor Services
FreeNewsFeed | Free Newsletters

About NewsFactor Network | How To Contact Us | Article Reprints | Careers @ NewsFactor | Services for PR Pros | Top Tech Wire | How To Advertise

Privacy Policy | Terms of Service
© Copyright 2000-2014 NewsFactor Network. All rights reserved. Article rating technology by Blogowogo. Member of Accuserve Ad Network.