The introduction of Cisco Routed Optical Networking transformed the optical networking industry, breaking a 20+ year multi-layer network architecture and paving the way to a converged IP+Optical network architecture. With the introduction of pluggable coherent optics just a few short years ago, we asked, “What benefits might result with a new network architecture?” And, the answer was “significant OpEx and CapEx savings results” with what is now known as Routed Optical Networking. Routed Optical Networking collapses the IP, OTN, and Optical layers with coherent optics plugged directly into router and switch ports. When combined with multilayer visibility, automation, and management, the solution simplifies operations and reduces total cost of ownership (TCO).
This makes the integration of optics and routing more efficient and economical and helps our customers simplify and reduce expenses, while also enabling faster time to market. According to the latest Cignal AI “Active Insight” report,” the market for router-hosted pluggables is already sizeable but will continue to further grow as operational issues are solved and new generations of optics evolve.
Today, Cisco Routed Optical Networking has been deployed by more than 200 customers in 400G metro and data center interconnect (DCI) applications. These customers have benefited from increased capacity, reduced energy consumption and lowered network costs, complexity, and footprint. For example, infrastructure provider Colt Technology Services, has reported a stunning 97% energy savings. Arelion, the provider with the world’s #1 ranked IP backbone, has saved 64% in CapEx and 76% in OpEx by streamlining its architecture.
Routed Optical Networking is gaining traction across industries as well. The Connecticut Education Network (CEN), a regional research and education network, is benefiting from network modernization with Cisco.
“CEN will connect nearly 700 sites at 400G on a Cisco Routed Optical Network, decreasing costs to provide 400G everywhere, and serve as the backbone provider for a statewide shared service platform,” said Ryan Kocsondy, Director, CEN.
Expanded Use Cases for Routed Optical Networks
Key developments in Cisco’s market-leading portfolio of coherent pluggable optics are enabling new use cases for Routed Optical Networking that can be used by Hyperscalers, Service Providers, and Large Enterprises.
Cisco Routed Optical Networking 3.0
The release of Routed Optical Networking 3.0 further enhances the solution to enable new simplified optical deployments with the new ONS-QDD Pluggable Line System and continues to add unmatched open standards-based IP+Optical automation.
The ability to extend the reach and capacity of a single fiber span in the Cisco Routed Optical Networking architecture is the standout value of the QSFP-DD OLS solution, regardless of which interface is being used. The 3.0 release also introduces enhanced versions of the Routed Optical Networking automation components.
Economic Benefits of Routed Optical Networks for DCI, Metro and Long-Haul Applications
With Routed Optical Networking widely deployed and the pluggable coherent optics technology advancements, ACG Research recently conducted a TCO report leveraging these newer technologies for DCI short-haul, metro medium-haul, and long-haul applications. The detailed analysis revealed a TCO savings of up to 48% for DCI, 56% for metro, and 62% for long-haul. It also revealed that the adoption of Routed Optical Networking architecture reduces environmental expenses (power and facilities costs) by up to 83% across all three scenarios1.
This report further demonstrates the substantial financial and operational advantages of adopting Routed Optical Networking across different network applications. This is something that is well known by Hyperscalers, and we believe will drive the inevitable adoption by other network operators who will want to take advantage of the space, power, and cost benefits. With proven benefits in real-world deployments, it’s now a mature and widely adopted solution that’s able to meet the evolving needs of modern network infrastructures. As always, Cisco is here to help our customers remain agile and adjust quickly to technology changes.
If you’d like to learn more, join Cisco at these upcoming events:
In my three-decade-long career, I have had the privilege of undergoing extensive training in various aspects of cybersecurity, network security, and computer forensics. With numerous certifications and over 900 hours of specialized training from the NSA and the National Cryptographic School (NCS), and more than 600 hours from the FBI and the FBI Academy in Computer Forensics, I have always been committed to staying at the forefront of this ever-evolving field. As a result, I’ve found that to be successful in cybersecurity, it is crucial to remain committed to continuous learning and stay aware of industry developments. That’s why I recently completed a course that stands out as one of the best I have ever taken: “Performing CyberOps Using Cisco Security Technologies” at Cisco University. I’d like to share my thoughts with you about the value it has added to skills set, and can add to yours as well.
The Cisco University experience
First off, Cisco University offers a plethora of courses designed to enhance your skills and knowledge in various networking, security domains, forensics, incident response and more. The great thing is you can join “Cisco U” for free, and they offer a massive amount of free courses offerings. So, you can dive right in without any expense. And although some courses do involve a fee, I have found they are well worth the expense.
Cisco University’s “Performing CyberOps Using Cisco Security Technologies” course was particularly exceptional. I learned so much. Despite the early mornings and late nights working around my day job, the experience was incredibly rewarding. The course was definitely challenging, but the knowledge and skills I gained were well worth the effort.
Why Cisco University training is Worth your time
Having accumulated a significant amount of training and certifications over the years, I can confidently say that Cisco University training programs are unparalleled. The “Performing CyberOps Using Cisco Security Technologies” course utilized Cisco’s security portfolio in a Security Operations Center (SOC) environment, making the learning experience both real and hands-on. This practical approach is what sets Cisco University training apart from others.
Cisco University provides engaging labs and learning through Cisco dCloud. The dCloud lab provided an unparalleled hands-on experience that helped bridge the gap between my theoretical knowledge and practical Security Operation Center (SOC) applications, playbook, and processes using the powerful Cisco Security Portfolio tools that Cisco uses in their SOC.
Cisco dCloud provided a dynamic, cloud-based platform where I was able to
access a wide array of preconfigured virtual environments tailored to both
the course content and the various Cisco security technologies and solutions.
This immersive learning environment allowed me to experiment with real-world
scenarios during the course, troubleshoot issues, and implement real security and
incident response solutions in a risk-free setting.
The virtual classroom instruction was fantastic, but by leveraging Cisco dCloud, I had the ability to gain invaluable experience that enhanced my understanding of complex concepts. The course prepared me for real-world challenges and will definitely help me in my everyday job.
My advice after taking this class is, whether you’re a seasoned security professional or new to the field, the interactive classes and labs on Cisco dCloud at Cisco University are an essential resource for deepening your expertise and staying ahead of adversaries with cybersecurity and incident response technologies.
Course highlights: Performing CyberOPS using Cisco security technologies
The course offered by Cisco University covered a wide range of topics essential for anyone involved in cybersecurity operations. The best part was that I got to use our great Cisco Security portfolio. Here are some of the key areas covered in the class that helped expand my skills set.
Threat hunting and incident response
What I learned at Cisco University: Threat hunting and incident response involve proactively searching for and identifying potential security threats within an organization’s network (threat hunting) and systematically addressing and mitigating security incidents when they occur (incident response). Threat hunting aims to uncover hidden threats that may have bypassed automated defenses, while incident response focuses on containing, eradicating, and recovering from detected security breaches. Together, these practices enhance an organization’s ability to detect, respond to, and prevent cyber threats effectively.
Performing CyberOPS using Cisco security technologies
What I learned at Cisco University: Performing CyberOPS using Cisco security technologies involved leveraging Cisco’s suite of security tools and solutions to conduct cybersecurity operations and incident response. This included monitoring, detecting, analyzing, and responding to security threats within an organization’s network. Utilizing Cisco’s advanced technologies, such as firewalls, intrusion detection systems, and security information and event management (SIEM) platforms and XDR, enhanced the effectiveness and efficiency of cybersecurity efforts, ensuring robust protection against cyber threats.
Performing incident investigations and response
What I learned at Cisco University: Performing incident investigations and response involved systematically examining security incidents to determine their cause, scope, and impact, followed by taking appropriate actions to mitigate and resolve the issue. This process included identifying the affected systems, collecting and analyzing evidence, containing the threat, eradicating the root cause, and recovering normal operations. I learned that effective incident investigations and response are crucial for minimizing damage, preventing recurrence, and improving an organization’s overall security posture.
Threat hunting basics
What I learned at Cisco University: Threat hunting basics involve the proactive search for cyber threats that may have evaded existing security defenses. This process includes using advanced techniques and tools to identify unusual patterns, behaviors, and indicators of compromise within an organization’s network. The goal is to detect and mitigate threats before they can cause significant harm. Mastery of these basics is essential for enhancing an organization’s security posture and staying ahead of potential attackers.
Threat investigations
What I learned at Cisco University: Threat investigations involve the systematic process of examining and analyzing potential security threats to determine their nature, origin, and impact. This includes gathering and analyzing data, identifying indicators of compromise, and understanding the tactics, techniques, and procedures (TTPs) used by threat actors. The goal is to uncover the full scope of the threat, mitigate its effects, and prevent future incidents. Effective threat investigations are crucial for maintaining an organization’s security and resilience against cyberattacks.
Malware forensics basics
What I learned at Cisco University: Malware forensics basics involve the fundamental techniques and methodologies used to analyze and investigate malicious software (malware). This includes identifying, isolating, and examining malware to understand its behavior, origin, and impact. The goal is to uncover how the malware operates, what it targets, and how it can be mitigated or removed. Mastery of these basics is essential for effectively responding to and recovering from malware incidents.
Performing security analytics and reports in a SOC
What I learned at Cisco University: Performing security analytics and reports in a SOC involves analyzing security data to identify trends, detect anomalies, and uncover potential threats. This process includes using advanced analytical tools and techniques to interpret data from various sources, such as network traffic, logs, and threat intelligence feeds. The findings are then compiled into comprehensive reports that provide insights into the organization’s security posture, helping to inform decision-making and improve overall security strategies.
Threat research and threat intelligence practices
What I learned at Cisco University: Threat research and threat intelligence practices involve the systematic study and analysis of cyber threats to gather actionable information about potential and existing security risks. This includes identifying threat actors, understanding their tactics, techniques, and procedures (TTPs), and monitoring emerging threats. The insights gained are used to inform and enhance an organization’s security posture, enabling proactive defense measures and more effective incident response.
Implementing threat tuning
What I learned at Cisco University: Implementing threat tuning involves adjusting and optimizing security tools and systems to improve their accuracy in detecting and responding to threats. This process includes fine-tuning detection rules, filters, and thresholds to reduce false positives and ensure that genuine threats are identified promptly. Effective threat tuning enhances the efficiency and effectiveness of a SOC by ensuring that security alerts are relevant and actionable.
Investigating endpoint appliance logs
What I learned at Cisco University: Investigating endpoint appliance logs involves analyzing the log data generated by endpoint devices, such as computers, mobile devices, and IoT devices, to identify and understand security events and incidents. This process helps in detecting anomalies, tracking malicious activities, and gathering evidence for incident response. Effective log investigation is crucial for maintaining endpoint security and ensuring the integrity and safety of an organization’s network.
SOC operations and processes
What I learned at Cisco University: SOC operations and processes encompass the day-to-day activities and workflows carried out within a SOC to monitor, detect, analyze, and respond to cybersecurity threats. These processes include threat detection, incident response, vulnerability management, and continuous monitoring of an organization’s IT environment. Effective SOC operations and processes are critical for maintaining robust security, minimizing the impact of security incidents, and ensuring the overall protection of an organization’s digital assets.
Understanding SOC development and deployment models
What I learned at Cisco University: SOC development and deployment models refer to the strategies and frameworks used to design, implement, and manage a SOC. This includes determining the SOC’s structure, operational processes, technology stack, and staffing requirements. Understanding these models is essential for creating an effective SOC that can efficiently monitor, detect, and respond to cybersecurity threats, tailored to the specific needs and resources of an organization.
Understanding APIs
What I learned at Cisco University: Application Programming Interfaces (APIs) are sets of rules and protocols that allow different software applications to communicate and interact with each other. APIs enable the integration of various systems and services, facilitating data exchange and functionality sharing. Understanding APIs is crucial for developing, managing, and securing applications, as they play a key role in enabling interoperability and enhancing the capabilities of software solutions.
Understanding cloud service model security
What I learned at Cisco University: Cloud service model security involves the strategies and practices used to protect data, applications, and infrastructure associated with different cloud service models—such as Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS). Each model has unique security requirements and responsibilities shared between the cloud service provider and the customer. Understanding these security measures is essential for ensuring data privacy, compliance, and protection against cyber threats in cloud environments.
Understanding analytical processes and Playbooks
What I learned at Cisco University: Analytical processes in cybersecurity involve systematically examining data to identify patterns, anomalies, and potential threats. These processes use various techniques, such as data mining, statistical analysis, and machine learning, to transform raw data into actionable insights. Understanding these processes is crucial for making informed decisions, improving threat detection, and enhancing overall security posture. Playbooks in cybersecurity are predefined, step-by-step guides that outline the procedures and best practices for responding to specific types of security incidents or threats. They provide a standardized approach to incident response, ensuring that actions are consistent, efficient, and effective. Playbooks help streamline operations, reduce response times, and improve coordination among security teams.
Understanding risk management and SOC operations
What I learned at Cisco University: Risk management in cybersecurity involves identifying, assessing, and prioritizing potential threats to an organization’s information assets. It includes implementing strategies to mitigate or manage these risks to ensure the confidentiality, integrity, and availability of data. Effective risk management helps organizations minimize the impact of security incidents and maintain business continuity. SOC operations refer to the processes and activities carried out within a SOC to monitor, detect, analyze, and respond to cybersecurity threats in real-time. SOC operations involve the use of advanced tools and technologies to ensure continuous surveillance of an organization’s IT infrastructure, enabling rapid incident response and threat mitigation to protect against cyberattacks.
Wrapping up: Final thoughts on Cisco University
If you are looking to elevate your cybersecurity, network security, forensics and/or incident response skills, Cisco University is the place to go. The “Performing CyberOps Using Cisco Security Technologies” course is a great example of the high-quality training that Cisco offers. It is challenging, rewarding, and incredibly informative. I highly recommend it to anyone serious about advancing their career in this very complex field.
Investing your time and effort in Cisco University training is undoubtedly worth it. The skills and knowledge you gain will not only enhance your professional capabilities but also prepare you to tackle all the hard challenges in the cybersecurity and computer forensics fields.
Network security is the foundation of a customer’s security posture. Having a firewall that can adapt to your customers’ changing needs is essential to protecting their network. Cisco, a leader in networking and cybersecurity solutions, understands this need and has introduced a range of new security incentives and promotions to maximize your profitability when selling Cisco Firewalls. The new programs are designed to be simple for you to leverage as you help businesses of all sizes secure their data and IT infrastructure effectively.
Be sure to check out this video on the new incentives.
Now, let’s dive into our latest offerings.
Targeted Competitive Firewall Program
Security Suites: Residual Value Subscription Credits and Competitive Displacement Incentives
Security Concierge Deal Support
Firewall Software Upgrade Offer – coming soon
In his latest blog, Brian Feeney, Vice President of Global Security Partner Sales, highlights how Cisco’s new Security incentives and promotions demonstrate our commitment to improving your Cisco experience and empower you to maximize your profitability and enhance your customers’ cybersecurity posture. Whether you’re looking to upgrade your existing infrastructure, switch from a competitor’s product, or ramp up a security suite, Cisco has tailored options to suit your needs. To take advantage of these opportunities, check out our dedicated Security Promotion, Bundles, and Offers hub on SalesConnect, just for partners.
Remember, the cybersecurity landscape is constantly shifting, and encouraging your customers to have up-to-date security products in place is crucial. With Cisco’s innovative solutions and incentives, you can ensure the network remains secure against the threats of today and tomorrow.
Mark your calendars for a Partner Interactive Webinar (PIW) where we’ll review all the new promotions in detail leaving you with a strong understanding about how these programs benefit your organization.
AMER: June 11, 2024, at 1:00pm EST | Watch the recording!
EMEA: July 11, 2024, at 3:00pm CET | Register today!
APJ: June 27, 2024, at 11:30am SGT | Register today!
Gartner’s Market Guide for Network Automation Platforms highlights that more than 65% of enterprise networking activities are performed manually, and only a small but growing percentage of large enterprises automate more than half of their network activities. Delivering superior digital experiences for an enterprise involves powering multiple, disparate networking domains and/or deploying multiple solutions within a single domain. This results in multiple challenges for network operators, including:
As a result, users experience steep learning curves, lengthy implementation times, and ultimately suboptimal and under-maintained automation adoption across their global infrastructure.
To address this complexity, we announced Cisco Workflows, a new set of capabilities at the heart of Cisco Networking Cloud, earlier this month in June at Cisco Live US 2024. Delivered as a cloud-hosted service, organizations can use Workflows to define, automate, and orchestrate configuration tasks within and across their domains—branches and sites, campuses, data centers, clouds—with just a few clicks using a low- to no-code environment. Cisco Workflows helps users focus on accelerating business value, increase infrastructure usage and efficiencies, and reduce costs and time lost to manual errors.
Workflows offers out-of-the-box automation across multiple products and domains, following design guidelines and best practices recommended in Cisco Validated Designs (CVDs). A powerful set of low- to no-code customization options (e.g., drag-and-drop API tasks, data transformation) enable users to easily modify and extend the automations for their specific use case. Workflows automates both cloud-hosted service APIs and on-premises network controller API endpoints. A secure cloud connectivity service hosted on-premises enables the connectivity from Workflows to the on-premises endpoints. Users get real-time updates to track workflows execution progress, pause execution to accept inputs from other users within the organization, and review audit logs of previous automation runs. Workflows will be accessible from within Cisco Networking Cloud’s Cross Platform Navigator, via single sign-on (SSO), and through embedded links in various Cisco controllers.
Today, Cisco Workflows includes the following Cisco controller adapters to run automation—Application Centric Infrastructure (ACI), Catalyst Center, Identity Services Engine (ISE), Catalyst SD-WAN, Meraki, and many more. The automation hub provides two ready-to-go sample validated automations using these adapters:
Workflows, as a low-code procedural automation capability, provides the fine-grained control and insights into execution flow required for the flexible implementation, debugging, and troubleshooting of cross-domain automation. Workflows resides on a platform that holds multiple certifications including ISO 27001, ISO 27017, SOC 2 Type 2, SOC 3, CSA, and STAR 1, underscoring our unwavering commitment to data security and compliance. The service is designed to effortlessly scale automation across millions of endpoints worldwide while ensuring unmatched security and seamless integration with hybrid cloud environments.
With this advancement, we continue to simplify the experience for our customers, empowering organizations to thrive in today’s dynamic digital landscape with confidence and ease. Customers and partners are already going through beta trials with Cisco Workflows.
“As beta testers, we are beginning to explore the new cross-domain automation functionality within Cisco Workflows. We are starting to migrate some of our existing automation scripts to the Workflows system and are excited to see how these capabilities will be able to simplify tasks for our customers in the future.”
—Stefan Ronge, NTS (a managed service provider in Europe)
“We have been exploring the beta capabilities provided within Cisco Workflows and see a real potential to help automate key parts of the networking infrastructure. Our evaluation has been running on complex multi-domain infrastructures including Catalyst Center SDA and ACI.”
—Ingmar Schön, EnvOcean Network Systems (a network consulting firm in Europe).
It was almost fifteen years ago that ThousandEyes co-founders Mohit Lad and Ricardo Oliveira recognized the Internet-sized blind spot in network visibility preventing companies from delivering flawless user experiences. Fast-forward to today’s hyper-distributed world and our dependency on external environments has increased exponentially.
The Internet has become the delivery mechanism for mission-critical customer and employee applications, services, and websites. ThousandEyes pioneered end-to-end visibility across Internet, cloud, and SaaS environments, becoming a critical solution for IT and Operations teams that rely on networks and services that they don’t own or directly control.
Over the last few years, users have become more distributed and more dependent on digital services. Workers connect from home, cafes, airplanes, and more. Nearly every organization is dependent on digital connectivity, whether for marketing, productivity, patient outcomes, manufacturing efficiencies, financial and supply chain management, or other critical functions.
ThousandEyes has been there every step of the way, helping our customers successfully embrace an increasingly global workforce, modernize their digital infrastructure, and unlock new business opportunities through improved digital experience outcomes. Throughout this journey, our data has continued to increase, and with it, the insights gleaned across our entire dataset. Our vantage points have grown by the millions, our measurements by the billions. We’ve unlocked visibility into new domains whether on premises or deep in the cloud. As part of Cisco, we have unparalleled access to network telemetry and management controllers across every network domain.
We’re now at a point where the sheer volume and scope of data, combined with our AI-native platform purpose-built to scale for the next phase of our evolution, allow us to do so much more.
Today we are ushering in the new era of Digital Experience Assurance (DXA) for Cisco Networking Cloud and beyond—an expansion of our product strategy and capabilities, powering a radical shift in IT operations from monitoring to automated action. Imagine correlating, analyzing, diagnosing, predicting, optimizing, and remediating with little or no manual intervention—all seamlessly connected to a vast IT ecosystem that powers today’s businesses. This is the opportunity at hand. We’ve already delivered solutions that prove we’re uniquely able to seize this opportunity, and we intend to continue doing so to its fullest potential.
A step-change in IT management
We’re radically evolving how our customers assure digital experiences by doubling down on our core values and expanding investments and innovations in three essential areas.
Shattering silos and extending our visibility to everywhere our customers need it.
Today, our platform is powered by over 650 billion daily measurements collected from around the globe. We are a leading authority on Internet, cloud, and SaaS performance. This visibility has been critical to our customers as they transition and adapt to an increasingly cloud-first world. But our customers tell us that they still need visibility into their internal environments, and they want to be able to leverage the power of ThousandEyes’ end-to-end insight across their on-premises networks, cloud environments, and beyond. With Cisco, we’re going to continue to expand visibility to wherever our customers need it.
Leveraging AI to surface the insights that truly matter to our customers.
IT teams are inundated with alerts and noisy data, making it nearly impossible to determine what might be a red herring, how to prioritize, and where to apply resources. AI-driven intelligence can correlate patterns and unique combinations to triangulate the source of a problem instantly and surface which incidents require attention, and which do not. ThousandEyes Event Detection is already providing this critical capability reducing to mere minutes what could ordinarily take hours and multiple engineers to achieve. We’re going to invest and innovate more in this arena.
Enabling closed-loop workflows that automate and accelerate critical actions for our customers.
Acting quickly across a vast array of IT dependencies requires seamless interoperability with disparate datasets and management systems. ThousandEyes is committed to supporting and fostering open standards through OpenTelemetry (OTel), a robust API, and native integrations with IT services management tools (ITSM), Infrastructure as Code (IaC), observability, and other critical systems. By integrating ecosystems and leveraging interoperability, we can now translate AI-driven recommendations into configuration commands that drive action across both customer owned and unowned domains. We do this today with our predictive analytics solution WAN Insights—combining ThousandEyes’ AI-native intelligence with Cisco Catalyst SD-WAN to provide forecasting, recommendations, and implementation of optimal policy configurations. We’re going to expand and extend these capabilities to other Cisco Networking Cloud platforms, and beyond.
Driving Digital Experience Assurance across Cisco Networking Cloud and beyond
As part of Cisco, we’re accelerating seamless integrations that unlock out-of-the-box capabilities for Cisco Networking, Security, Collaboration, and Observability customers. ThousandEyes also remains dedicated to meeting our customers where they are and supporting every environment and vendor of choice. Our commitment extends to fostering integrations across diverse IT systems and networking infrastructure vendors, ensuring comprehensive support for all our customers.
Today’s ThousandEyes innovation announcements demonstrate this commitment—extending our visibility and support for public cloud environments and expanding our reach into on-premises networks through the collection of flow and device data from both Cisco and non-Cisco network equipment.
We understand that in today’s digital landscape, our customers’ business outcomes depend on consistently delivering exceptional digital experiences to every user, everywhere, every time. Which is why we’re not just taking a step but making a leap in our commitment to deliver the next era of Digital Experience Assurance. This leap will transform how our customers manage their IT operations and formulate their digital strategy, leveraging AI-native capabilities to perform smarter, faster, and with greater ability to capitalize on the digital opportunities ahead. Stay tuned for more exciting developments, because we’re just getting started.