B2B Tech Talk with Ingram Micro
B2B Tech Talk with Ingram Micro

Episode · 2 years ago

Get Secured with Cisco | Cisco Series

ABOUT THIS EPISODE

Nothing is 100 percent safe. But a zero-trust approach to security can keep data locked away from online predators.  

Cisco and Ingram are focusing on new security solutions, including the new Cisco Duo to help businesses stay protected. 

In this episode of B2B Tech Talk, host Keri Roberts talks with Thomas Mann, Sr. Solution Center Engineer, Ingram Micro, Kevin Switzer, Technology Consultant of Cyber Security for Cisco Solutions, Cisco, and Collin Rauen, Senior Channel Account Specialist, Ingram Micro

In this episode, they chat about:  

  • Changes in security in the past year 
  • Why a zero-trust solution is better than a firewall 
  • Solutions for secure remote access, bring-your-own-device plans and anything that specializes in healthcare data  

Follow us on Twitter @IngramTechSol #B2BTechTalk 

Sponsored by Cisco and Ingram Micro Financial Solutions 

Listen to this episode and more like it by subscribing to B2B Tech Talk on Spotify, Apple Podcasts, or Stitcher. You can also listen on our website.

You're listening to bedb tech talk with Ingram Micro, the place to learn about new technology and technological advances before they become mainstream. This is this Cisco addition taking your business a level up. Let's get into it. Welcome to be tob tech talk with Ingram micro. I'm your host, Carry Roberts, and we are welcoming today Thomas Man, the Senior Solution Center engineer at Ingram Micro, Kevin Switzer, the technology consultant of cyber security for Cisco Solutions, and Colin Rowan, the senior channel account specialist at Ingram Micro. Welcome, gentlemen, thank you for being here today. Thank you. Were excited to be here. So there have been three areas in the last year that have been prime places where security is of utmost concern, and they include schools, remote working and healthcare. And I'd love for us to start off with schools. Why have they been a top target for hackers recently? Well, basically it's the nature of the schools. They have a lot of byod devices coming into the school and that could be difficult to manage, a real security issue. Also, every year schools of new users coming in, new students, and that again makes it difficult to manage, difficult to know who's who. And then there's a real part of goal. There's tuition paychecks of the actual teachers, grants, mostly with higher education, and those are a big target of bad actors, basically. And the other element that we have, the second piece we mentioned was remote working and for those that don't know, there is actually a difference between working from home and remote work. Can you explain the difference between the two and why it's important to secure remote access? Yeah, I'll take what that one though. This is Kevin Switzer. For A homeworker,...

...typically you're going to have a person who's just to have a Home Office set up. In many cases you're only worried about the connection between that Home Office and the actual corporate office. So one connection to worry about. You could even set up a router at the Home Office to directly connect to the corporate office or have a vpns up on the device, and that's really the main thing you have to be concerned about. With a remote worker. They could be working from really anywhere, so a lot of cases are going to be working from hotels locally, working from airports, coffee shops or other companies offices. So on those networks that they're initially signing into to gain Internet access, there's going to be a lot of other users potentially on that network. So that introduces a whole new level of security concerns because there is potential for those those folks on the local network to be able to access potential packets or records coming in out of that person device over that network. And the third one we have as healthcare and healthcare and patient data is this other area of big concern and it has been for a while when it comes to security. What's happening that's new in the space that creates security concerns? Well, it's there's there's two main avenues within healthcare that make them such a high priority target for attackers. The first one I'll mention is the patient records themselves. So if you think about any time you've ever been to a doctor's office or any are first thing you have to do is fill out a whole bunch of information. Of course that information gets stored into the healthcare system because it's not started to have that information. So the doctors have information at their finger tips to find out what they might need with that there's a ton of information in these records. So an attacker can get their hands on this and it can be used for variety of different purposes in the wrong hand. So it could even...

...be used for a person that matches that description to use it for them to get actual health care benefits or to receive healthcare. On top of that, since there's so much information, it can be used to actually open accounts, increity so fully, actually feeling someone's identity and for the purpose of some attackers are simply looking to still information so that they can sell it on the dark web, and the highest priced records for sale on the dark web for the last, it's a two consecutive years has actually been the records of patients in their healthcare the other main avenue that makes healthcare, and specifically hospitals, such targets for specific attacks and more specifically for ransomware type of attacks as that because the attackers know if they are do have the ability to lock down all the computer systems in a hospitals network. They know that lives are at risk here and that the decisionmakers know this and that they will be most likely to pay the ransom very quickly, without too much hesitation. I did not even think about that, that people are going after people's not only their identities, but to get healthcare insurance and benefits. Absolutely, think about all the people who are out there who don't have insurance and have a medical problem and if they have the ability to pay a certain amount of money to receive those benefits, that certainly has created a market out there. Yeah, now, when we're talking security, it's important to complete a zero trust security. What does that mean and how does having that impact? They things like hybrid clouds, ACI or SD access. Yeah, absolutely, zero trust is really the way the security industry is moved recently. In the past we used to set up a land, set up a perimeter layer security, like a firewall, and then...

...everything on that land we'd consider trusted. That's really not the case anymore. Now users could really be anywhere. We have users coming and going on our network. We have resources in the cloud, hybercloud, they're all over the place. So Zero Trust is really about not trusting any network anywhere. We want to secure everything everywhere it is and verify identity, and then that comes into play with ACI, for example. ACI is really about managing and securing basically your corporate workload. So this could be in the cloud, set up hypercloud data center all the business applications that are running. We could secure with ACI and different add ons to ACI. Then we actually have the campus network. Still we still have a lot of users in corporate offices and we can't really trust that entire network because there's so many users on it. Any user could be a bad actor. You could have guests come in, you could have vendors come in and you can't trust them all. So the IDEA IS CISCO HAS SD xcess and this is a combination using CISCO'S DNA center and Cisco's identity services engine to really lock down that network so we could manage it very flexible granule policies to manage the network but also do things like micro segmentation to try to contain any anomalies or any spread of any viruses or mail ware. And this works across both wireless and wired networks for all the young points out there. So it's really the topnotch way to go to secure your campus. Real quick, before we jump straight back into the episode today, we want to tell you about Ingram micro financial solutions and how you can maximize your buying power and get to yes with your customers faster. For the last nine years,...

Ingram micro has been channel pros reader's choice for best financing options. Put The power of our credit and leasing options to work for you. You can easily contact financial solutions at Ingram microcom. All right, let's get back to the show now. I KNOW CISCO has some new security features for two thousand and twenty, including the launch of Cisco duo. Can you talk about what's new and WHAT CISCO DO IT provides? Well, let me start out with I will duo is new dual with an acquisition by Cisco recently and that now does fall under the Cisco Security Portfolio and also is now being sold in purchased through distribution l micro. So duo as a whole is quite new to all of us and just to give a brief idea of the kind of the the features and the value points here are, duo does fall under the MFA, or multi factor authentication type of products suite. So it's a the main feature that duo gives you is multi factor authentication as push and what that means basically is the user selected device registers it so when it needs be, when they're trying to access system on their safe laptop, for example, they will receive a prompt on their cell phone or their smartphone for example, and they will simply click a proof. So this way we know that this user at least has two different devices, which is a much higher level level of authentication to prove that they are who they say they are, also and what really said to due. Part of these next features actually gives the systems ability to look into the visibility of security hygiene of a device. So, for example, I have a company issued laptop. The company makes sure that this laptop software is up to date and all the vulnerabilities for security having passed, things like that. But let's say I am using one of my personal devices while I'm at home to check my email and do a little bit of work. So...

...now, even though I do have proper logging credentials, let's say I have not kept up the patches on the software for my personal laptop. Duo Access is actually going to be able to look into that and say, Hey, wait a minute, you have a very vulnerable piece of software on your personal device, so you're going to actually need to update that before we're going to grant you access once that access is allowed and we we've gone to that hygiene process that's actually going to take a look into policies and control set forth by the company and saying, all right, if you're in your corporate laptop, you have access to these array of systems because that's the type of work you do, and no problem, but if you're connecting from your personal laptop from home, perhaps we're going to lie you to access email and nothing else, stuft, for example, because we understand where you're can email it and if but perhaps you should limit the rest of the rook to win your factoring business hours. In all, the idea behind this, this duo system, is to block unauthorized users from getting access to the system, as well as unauthorized devices. It's the call out some of the the key vailu profit. What sets do apart from its competition? It's going to be the ease of use, the ease of management and the ease of ability to deploy quite quickly as compared to other security systems. It does provide very broad coverage across multiple APPs, devices as well as users, and the speed to speed to security is cloud based, so there's very little to actually implement and it's very easy for users to adopt as well. We all know as as users of these systems that it can really be a learning curve to figure out how to use it and just get through our day back to our normal working function. But would fill it very intuitive, very easy for the user to adopt. Than definitely yeah, and which regrets to pricing in general. Like duos awesome because there's no specific and user account needed. So some traditional Cisco products might require like minimums of like maybe twenty five users are above but duel right off the bat you can start with just one user. One user to a hundred typically is going to range for about three dollars per user. But it's tiered pricing,...

...so the more users that you add, the better price is going to be. And then, obviously, since it's kind of new product to the environment, we're trying to get test out there. So Cisco actually have a promotion going on right now where, if you register are not for resale also another an Nfi through Cisco, you can get up to twozero users out about a hundred percent off. So obviously Cisco's trying to make sure that the end users in the resellers obviously have the capability to test this product out and they also can use their do a website as well. If you go to a duo dot democom, that's just another resource that you can use for enablement as well. And then Tom over here in the experience center, he knows how to do pretty much everything when it comes to demos. He's getting up to speed on due as well. So between all the different resources Cisco has, an Ingram has, it's something that you definitely should be taking advantage of. Yeah, I think that's that's great. I mean I love that you broke that down for us. How can it also how help with some of the situations we spoke about earlier in this episode and make places like schools, healthcare and remote working safer? Can you give us some examples of how it would work within those mediums? So a lot of these different types of environments, like higher education, healthcare or just remote, remotely working, have a lot of similar aspects. One there's a lot of bring your own device and this case users want to be able to get on quickly, so do allows them to instantly deploy. They could self penroll themself, saving time real big with students. You have a college with four or five, tenzero students coming on, you don't want to have to manually set up each device. so that self enrollment really helps. In addition, the management of this is very easy to use. It's designed to be intuitive, it's cloud managed and administrators could immediately get benefit from it. It also provides very good insights of the hygiene and everything going on with these devices. And then, finally, you know,...

...when it comes to schools, for example, dual protects, you know, you know the different types of data that they might have. Like students have research data. There's also data about their identity, you know, in the school that can be protected. So the ideas when ever they're connecting these remote users, the students, workers in the healthcare you know they're verified properly and the administrators could be confident that they are who they say they are and there all the DAYTA is secure. Now where can people learn more about all the stuff we talked about today? If they have questions about Cisco duo or anything else with insecurity? Where can they do that? Yeah, so I'd say anybody on this call is more than capable of helping out. The starting conversation with regrets to do. Oh, but specifically I'd probably stay start with myself, Colin, just to make sure we get you in the right contact with people when it comes to like orders and processing, typically or Cisco software us, who's going to handle all the order processing and information. But just for a starting point, reach out to myself, Colin Rowan, and I'm more than happy to get you guys in touch with the right people. Perfect and we can link that in the show notes as well your email. The last question we like to ask all of our guests here on the show, and I'll ask each of you, is where do you see technology going within the next year, and Kevin will start with you. Okay, let me start with a kind of where my roles falls into you know, to be good at advising on Cyberscruy, I have to really study attacks and attackers and the trends and what attackers are doing out there. And but I've seen over the last several years that stay is consistent is that basically the hackers react to what the security many factors have put in place. So I am obviously anticipating that we're going to see the attackers coming out with some new types of attacks and new strategies and things like that, and I'm going to see the industry and...

...technology shifting more towards this scene. We've been talking about zero trust and multi factor types of authentication. I really just see this as being kind of the new way to really be secure and companies are going to invest more in these types of security solutions. Okay, what I see actually is a trend in the industry, and especially with Cisco, is really them taking the complexity out of a lot of their tools, especially with security. More and more of their different security products are all working together now, the management tools all talking to each other and fully integrating. That includes dual integrating into with these solutions, but their firewalls or DNS based security, all of these different products are now fully integrated to help with thread hunting and overall ease of use and management, and that include using the cloud to make things easier to do. So that's a big trend. I don't think just Cisco's doing that, but a lot of other companies to, but Cisco's kind of leading the way in that aspect. Yeah, and, like Tom said, I mean long Gonner, the days of and user kind of dealing with like seventy different security vendor lines and everythings this goes really trying to make it more streamlined. The kind of like to use the analogy. Would you rather fly playing with seventy different parts or just, you know, one manufacturer making them? This one would be CISCO, obviously. So I mean you kind of like to see if Cisco doesn't have that specific technology out there today, they're definitely they're going to, you know, work on acquiring it or making something that's going to work friend users. So just smooth acquisitions throughout Cisco and having one vendor is going to be, you know, kind of the new trend. I'd like to say well, thank you to all three of you for sharing your knowledge and insight on this topic and I look forward to hearing more. So thanks for being here. Thank you very much. If you like this episode or have a question, join the discussion on twitter at Ingram Texel with the Hashtag be to be tech talk. Thank you for tuning in and subscribing to be to be...

...tech talk with Ingram micro. You've been listening to beb tech talk with Ingram Micro Cisco. Addition, taking your business a level up, hosted by Carrie Roberts, bb tech talk is a joint production by sweet fish media and Ingram micro. Ingram micro production handled by Laura Perton and Christine Fan. To not miss an episode, subscribe today in your favorite podcast platform.

In-Stream Audio Search

NEW

Search across all episodes within this podcast

Episodes (407)