The biggest tech companies are struggling in a crisis that seems not to have a end.
Cisco, HP, even Microsoft have announced layouts and reduction of employee. We can say this is a common issue for a moment of crisis, companies need to rise up ROI and cost reduction is a key factor. It’s also undoubted that laying off personnel is the easiest way to reduce costs.
But is this crisis just a matter of costs and ROI? or there are deeper reasons that are hitting those companies?
The economical crisis is just one of the many problems some tech companies are experiencing, from my point of view the main reason for the crisis is not just financial, but lays in a deeper problem: technology innovation and identity.
In the last years we saw a dramatic change in users behaviour and technologies, some new kids traced the route while the old giants struggles to follow.
Problem number one here, they become follower and not leader, and when you’re a big guy following is hard because you can’t hide nor run.
The company that invested in technologies, creating consensus and making things happen like apple or google traced a hard path to follow, they mark their identities to new and cool paradigma. Samsung was quick and efficient to jump on the train and using the same tools of innovation and “coolness” of the products conquer a market.
HP and Cisco on the contrary haven’t been able, till now, to redesign their identity into something different. Old products, old technologies, old communication…. If we’re take a look at what is happening in HP and Cisco right now we see cost reduction but we cannot see a real plan, a strategy a vision.
Dell forced his company to take a direction, hope will be successful because his courage has been amazing. He wanted to give a multi year vision and a clear position. we’ll see if time will give him the success he deserve. But to do this he was forced to take a decision, make Dell private again so to choose a direction and follow it even if the stock market is looking for different things at the moment.
What is the path for HP and Cisco?
The technology market has changed, it is changing. the Box and Hardware selling that has made the fortune of the two companies is reaching it’s limit, We so not change core switch every year unless there is a real technological change, and server and storage are not so different that the ones of 5 years ago…
While Cisco and HP looks for an identity Microsoft seems to have found again its will to succeed planning a transition that could change the face of the company. Again this is a technological and identity point. Cloud, Service and multiplatforms seems to be the new Microsoft mantra and we could expect that big “M” developer tools (that made the fortune of Microsoft OS) will soon be able to accomplish the new vision that the new energetic CEO is giving to the company.
The biggest tech companies are struggling in a crisis that seems not to have a end.
Cisco, HP, even Microsoft have announced layouts and reduction of employee. We can say this is a common issue for a moment of crisis, companies need to rise up ROI and cost reduction is a key factor. It’s also undoubted that laying off personnel is the easiest way to reduce costs.
But is this crisis just a matter of costs and ROI? or there are deeper reasons that are hitting those companies?
The economical crisis is just one of the many problems some tech companies are experiencing, from my point of view the main reason for the crisis is not just financial, but lays in a deeper problem: technology innovation and identity.
In the last years we saw a dramatic change in users behaviour and technologies, some new kids traced the route while the old giants struggles to follow.
Problem number one here, they become follower and not leader, and when you’re a big guy following is hard because you can’t hide nor run.
The company that invested in technologies, creating consensus and making things happen like apple or google traced a hard path to follow, they mark their identities to new and cool paradigma. Samsung was quick and efficient to jump on the train and using the same tools of innovation and “coolness” of the products conquer a market.
HP and Cisco on the contrary haven’t been able, till now, to redesign their identity into something different. Old products, old technologies, old communication…. If we’re take a look at what is happening in HP and Cisco right now we see cost reduction but we cannot see a real plan, a strategy a vision.
Dell forced his company to take a direction, hope will be successful because his courage has been amazing. He wanted to give a multi year vision and a clear position. we’ll see if time will give him the success he deserve. But to do this he was forced to take a decision, make Dell private again so to choose a direction and follow it even if the stock market is looking for different things at the moment.
What is the path for HP and Cisco?
The technology market has changed, it is changing. the Box and Hardware selling that has made the fortune of the two companies is reaching it’s limit, We so not change core switch every year unless there is a real technological change, and server and storage are not so different that the ones of 5 years ago…
While Cisco and HP looks for an identity Microsoft seems to have found again its will to succeed planning a transition that could change the face of the company. Again this is a technological and identity point. Cloud, Service and multiplatforms seems to be the new Microsoft mantra and we could expect that big “M” developer tools (that made the fortune of Microsoft OS) will soon be able to accomplish the new vision that the new energetic CEO is giving to the company.
Ok I know many of us experienced this kind of trip once in a lifetime.
I have travelled acquisition a lot of times, when mondadori informatica was absorbed by the mother comany mondadori, when brightmail become part of symantec, when symantec acquired veritas software and moved all european management to veritas, and at the end when cisco systems acquired Ironport.
All acquisitions means change and most of the changes are not well accepted, but I’m a long traveller on the seas of IT company and I’m quite used to changes so what has meant to me an acquisition?
The last the better, They use to say, and so I will talk about my experience from IronPort to Cisco, it will be useful to me to analyze what have happened and what means to me.
Chapter one: I used to be happy Geez guy life in a succesfful startup is great. I know lot of work and respnsability, but there is a sense of team, a common vision that ispire and drive us towards results. Usually managers and company expert use to say that a company is made by it’s people, well it is not the truth for big groups, where roles are usually overtaking the human part, but it is the truth for startup.
For the good or for the bed we’re on the same ship, take risk together and win or loose together. Ok better spirit when you win that when you loose of course. 😉
It was amazing working in IronPort, people was nice and supportive, and they give you that strange feeling like you can make a difference. Sometimes you have had something to complain (who does not) but at the end the humanity was very satisfactory…. And I have had a lot of fun and success.
One of the reason was the product, the email security appliance from IronPort was and it is still now the state of the art in this kind of tecnoogy, the other was the team: Domenico wasis a sales war machine, the partner were so focused and the comany were listening customer needs and react prompty to customer needs and market changes.
Very very good indeed, a strong team, a strong company a strong product: goals were accomplished and overachievement was “easy”.
Lot of work, and was all in one, technical, consulting, sales, marketing, pre and post sales. Fun fun and fun. 🙂
Ok I know many of us experienced this kind of trip once in a lifetime.
I have travelled acquisition a lot of times, when mondadori informatica was absorbed by the mother comany mondadori, when brightmail become part of symantec, when symantec acquired veritas software and moved all european management to veritas, and at the end when cisco systems acquired Ironport.
All acquisitions means change and most of the changes are not well accepted, but I’m a long traveller on the seas of IT company and I’m quite used to changes so what has meant to me an acquisition?
The last the better, They use to say, and so I will talk about my experience from IronPort to Cisco, it will be useful to me to analyze what have happened and what means to me.
Chapter one: I used to be happy Geez guy life in a succesfful startup is great. I know lot of work and respnsability, but there is a sense of team, a common vision that ispire and drive us towards results. Usually managers and company expert use to say that a company is made by it’s people, well it is not the truth for big groups, where roles are usually overtaking the human part, but it is the truth for startup.
For the good or for the bed we’re on the same ship, take risk together and win or loose together. Ok better spirit when you win that when you loose of course. 😉
It was amazing working in IronPort, people was nice and supportive, and they give you that strange feeling like you can make a difference. Sometimes you have had something to complain (who does not) but at the end the humanity was very satisfactory…. And I have had a lot of fun and success.
One of the reason was the product, the email security appliance from IronPort was and it is still now the state of the art in this kind of tecnoogy, the other was the team: Domenico wasis a sales war machine, the partner were so focused and the comany were listening customer needs and react prompty to customer needs and market changes.
Very very good indeed, a strong team, a strong company a strong product: goals were accomplished and overachievement was “easy”.
Lot of work, and was all in one, technical, consulting, sales, marketing, pre and post sales. Fun fun and fun. 🙂
Big company are really suited for security? This is what comes to my mind when we see what Cisco, HP and Co. do when we talk about security.
Are they really able to focus on the innovation and development that security require? I can talk about what I know so i will express my mixed feeling about Cisco and Security.
For long times Cisco has not been perceived as a big player in the security space, beside the fact PIXASA is the most sold firewall in the world.
But honestly we should not only consider the magnitude of the numbers but also why and how companies buy a product. Alas seems to me that ASA success blind Cisco eyes to the reason where sold so many pieces… ASA wasis seen as a commodity. when you buy some million hardware equipment you can also add some ASA, they cams with the flaw.
So Cisco has never really realized what security selling is, but sold a lot so why do not expand the business. As ususal when you want to expand the business the first thing you do is to acquire someone, like Ironport for example, and Scansafe. but then?
To be honest this is not only a Cisco Issue : acquisitions seems to be the mainstream activity of those years in security, everyone think that becoming bigger will means to be stronger… not sure it is always the truth….
But to be successful in security require a log term plan, investment and specialized people in sales and technical aspects. And security is not just a product is a stream of solution that have to address something.
So let’s take a look at Cisco offering to understand if we can find any trace of this vision.
Cisco presented it’s Borderless Network Vision replacing the “old” self defending network message in order to push the acceleration in new network and security equipement sales.
The core fo the message was, lan has no more borders, so you have to change your way to think. I think the message is right and appropiated and Cisco made several progress in terms of product and technology to accomplish the new vision.
But what has never been clear to me is which kind of security is intended in Cisco for a borderless world? just to make some few example:
Well here is where i am most confused, apparently with the EOLEOS of the ACE XML gateway Cisco has, reasonably, decided to leave this field to someone else.
Application security, when intended how to protect a customer that is delivering services is a really nasty job. too many things to work on. it was a niche area and require too much investment.
What is not so clear to me, on the other end, is why Cisco abandoned also the Ddos and dos prevention field. They apparently have had the technology that could be used (I mean CIO, Reputation and so on…) but they simply does not explored that side. This is quite funny since Ddos and dos attach have been the mainstream attacks those last years (anonymous remind you anything?).
On the other end we have to admit that there are hard to beat product out there, and if I should look for a anti dos solution i would probably go to Radware.
Pity with the IPS the path seemed correctly planned, with the introduction of the global correlation….but IPS is nor enought nor an application security device.
Here Cisco made some big investment, Ironport, Scansafe just to name the most renewed. but acquire a company is enought? after 7 years we’re still waiting for a complete integration of the product into cisco environment, implementation of “simple” features are still waiting. the general overview is that the company does not know where to go and how to go there. The historical difficulty of Cisco to adopt consistent management interfaces is quite clear when we see what happened to Ironport technology and the rest of the products. Still WSA is not able to talk with scansafe (bluecoat can, sigh) and even ASA has not been provided of a decent Scansafe connector yet.
So beside the products are intrinsically good (and the Gartner review show it quite evidently) what seems to be lacking is a project and a future. will they survive? or will they disappear?
On the End user security side we have seen also some weird moves that pissed off the market, think of the recent Linksys Router affair and the “cloud” management interface.
But I can understand that a big network equipement vendor has problem to understand the end user side of the equation, think also outside the security space with the CIUS and Flip….
Another indication that Cisco still not have a clear vision of the end user security space is the lack of basic feature like the Microsoft (c) AD multirealm support. No chaps Radius is not the solution, nor even Tacacs+
We have also some weird duplication like the ASA module to make application visibility and control (CX module) vs the Application visibility and control on WSA and Scansafe.
I’m not interested right now to go on detail but…guys where you want to go? where is the plan here?
Access Security
Here we have seen the most interesting moves, the new ISE product, the ASA improvements, the new Anyconenct are great products and good moves in this space.
Ok some of those, like ISE, are still new and need to growth, but seems the right direction to follow. and I have to admit that if correctly developed Trustsec will be a Winner technology. Just hoping that Cisco PM will understand that the point is to make things easier….
Data Center Security
er VSG, Virtual ASA? is anyone outside a few people in Cisco that are able to understand and explain what are those things? (I mean, of course we need both? what are the differences…..). And the rest?
Cloud Security
can cloud services as scansafe and cloud ironport email service be considered cloud security? or will be the new generation of virtual appliances that will cover this area? please can someone en-light me?
Just at a first overview, and not going product by product, seems quite clear that there still not a vision of what would be the approach in security by Big C, and considering the recent budget cuts I hardly see a bright future for the security in Cisco. We will continue to see great products with useless one, weird choices and a overall confusion cloud (so something in the cloud space is present).
Beside the marketing message seems that most of the promises are still waiting to be taken in consideration by Cisco, and in this field (security) where things change so quickly not to decide and not to act means to loose.
Is still security an Opportunity for Cisco? I do not think so, Big C, with a few product exception, can be a good follower, and when the market and the economy will allow they will buy something to claim to be the state of the art technology but without a consistent project we will see only randomly good product that, by the way, is not a bad thing per se.
But for Cisco will be hard to accomplish the BN vision and the other claim, one vendor is better, because at the moment it seems that, at least in the security space, there is not a real difference to buy only Cisco product or from other vendors in terms of manageability, integration and development.
Big company are really suited for security? This is what comes to my mind when we see what Cisco, HP and Co. do when we talk about security.
Are they really able to focus on the innovation and development that security require? I can talk about what I know so i will express my mixed feeling about Cisco and Security.
For long times Cisco has not been perceived as a big player in the security space, beside the fact PIXASA is the most sold firewall in the world.
But honestly we should not only consider the magnitude of the numbers but also why and how companies buy a product. Alas seems to me that ASA success blind Cisco eyes to the reason where sold so many pieces… ASA wasis seen as a commodity. when you buy some million hardware equipment you can also add some ASA, they cams with the flaw.
So Cisco has never really realized what security selling is, but sold a lot so why do not expand the business. As ususal when you want to expand the business the first thing you do is to acquire someone, like Ironport for example, and Scansafe. but then?
To be honest this is not only a Cisco Issue : acquisitions seems to be the mainstream activity of those years in security, everyone think that becoming bigger will means to be stronger… not sure it is always the truth….
But to be successful in security require a log term plan, investment and specialized people in sales and technical aspects. And security is not just a product is a stream of solution that have to address something.
So let’s take a look at Cisco offering to understand if we can find any trace of this vision.
Cisco presented it’s Borderless Network Vision replacing the “old” self defending network message in order to push the acceleration in new network and security equipement sales.
The core fo the message was, lan has no more borders, so you have to change your way to think. I think the message is right and appropiated and Cisco made several progress in terms of product and technology to accomplish the new vision.
But what has never been clear to me is which kind of security is intended in Cisco for a borderless world? just to make some few example:
Well here is where i am most confused, apparently with the EOLEOS of the ACE XML gateway Cisco has, reasonably, decided to leave this field to someone else.
Application security, when intended how to protect a customer that is delivering services is a really nasty job. too many things to work on. it was a niche area and require too much investment.
What is not so clear to me, on the other end, is why Cisco abandoned also the Ddos and dos prevention field. They apparently have had the technology that could be used (I mean CIO, Reputation and so on…) but they simply does not explored that side. This is quite funny since Ddos and dos attach have been the mainstream attacks those last years (anonymous remind you anything?).
On the other end we have to admit that there are hard to beat product out there, and if I should look for a anti dos solution i would probably go to Radware.
Pity with the IPS the path seemed correctly planned, with the introduction of the global correlation….but IPS is nor enought nor an application security device.
Here Cisco made some big investment, Ironport, Scansafe just to name the most renewed. but acquire a company is enought? after 7 years we’re still waiting for a complete integration of the product into cisco environment, implementation of “simple” features are still waiting. the general overview is that the company does not know where to go and how to go there. The historical difficulty of Cisco to adopt consistent management interfaces is quite clear when we see what happened to Ironport technology and the rest of the products. Still WSA is not able to talk with scansafe (bluecoat can, sigh) and even ASA has not been provided of a decent Scansafe connector yet.
So beside the products are intrinsically good (and the Gartner review show it quite evidently) what seems to be lacking is a project and a future. will they survive? or will they disappear?
On the End user security side we have seen also some weird moves that pissed off the market, think of the recent Linksys Router affair and the “cloud” management interface.
But I can understand that a big network equipement vendor has problem to understand the end user side of the equation, think also outside the security space with the CIUS and Flip….
Another indication that Cisco still not have a clear vision of the end user security space is the lack of basic feature like the Microsoft (c) AD multirealm support. No chaps Radius is not the solution, nor even Tacacs+
We have also some weird duplication like the ASA module to make application visibility and control (CX module) vs the Application visibility and control on WSA and Scansafe.
I’m not interested right now to go on detail but…guys where you want to go? where is the plan here?
Access Security
Here we have seen the most interesting moves, the new ISE product, the ASA improvements, the new Anyconenct are great products and good moves in this space.
Ok some of those, like ISE, are still new and need to growth, but seems the right direction to follow. and I have to admit that if correctly developed Trustsec will be a Winner technology. Just hoping that Cisco PM will understand that the point is to make things easier….
Data Center Security
er VSG, Virtual ASA? is anyone outside a few people in Cisco that are able to understand and explain what are those things? (I mean, of course we need both? what are the differences…..). And the rest?
Cloud Security
can cloud services as scansafe and cloud ironport email service be considered cloud security? or will be the new generation of virtual appliances that will cover this area? please can someone en-light me?
Just at a first overview, and not going product by product, seems quite clear that there still not a vision of what would be the approach in security by Big C, and considering the recent budget cuts I hardly see a bright future for the security in Cisco. We will continue to see great products with useless one, weird choices and a overall confusion cloud (so something in the cloud space is present).
Beside the marketing message seems that most of the promises are still waiting to be taken in consideration by Cisco, and in this field (security) where things change so quickly not to decide and not to act means to loose.
Is still security an Opportunity for Cisco? I do not think so, Big C, with a few product exception, can be a good follower, and when the market and the economy will allow they will buy something to claim to be the state of the art technology but without a consistent project we will see only randomly good product that, by the way, is not a bad thing per se.
But for Cisco will be hard to accomplish the BN vision and the other claim, one vendor is better, because at the moment it seems that, at least in the security space, there is not a real difference to buy only Cisco product or from other vendors in terms of manageability, integration and development.
When something can go wrong it will, at the end our friend Murphy was right. So I passed the day to to solve a weird problem, and I have to thanks a couple of colleagues of mine that were able to sort out what was wrong.
By the way at the end I survived the effort and after a whole day of troubleshooting I just reinstalled the appliance from scratch and everything worked.
The Web Interface
Now we can go on and see what we can do.
open a supported browser and go to:
http://<IP address or host name>/admin/
once we have installed the appliance we can finally log I to the web interface that looks like this:
enter the credentials you have created to login.
the interface is quite clean and clear:
with a dashboard reporting the main index and with menu on the top that refers to the various function and operations you can perform on ISE.
on the right upper part there is the Task Navigator that show some standard “wizard style” task to perform.
Task Navigators do not retain information about the tasks you have completed. It is a visual guide that takes you directly to the user interface screens where you perform its related tasks.
the tasks are:
• Setup—Perform the first part of the Cisco ISE setup process. • Profiling—Profile endpoints. • Basic User Authorization—Establish basic user authorization. • ClientProvisioning and Posture—Configure client provisioning and posture. • Basic Guest Authorization—Establish basic guest authorization. • Advanced User Authorization—Establish user authorization, along with client provisioning and posture. • Advanced Guest Authorization—Establish guest authorization, along with client provisioning and posture.
ok it’s late and my arm hurts like hell so I will continue in the next post
Related articles
ISE basic installation and configuration. Part 1 (aitechupdate.wordpress.com)
Configure cisco ISE for Cisco Access Points (aitechupdate.wordpress.com)
When something can go wrong it will, at the end our friend Murphy was right. So I passed the day to to solve a weird problem, and I have to thanks a couple of colleagues of mine that were able to sort out what was wrong.
By the way at the end I survived the effort and after a whole day of troubleshooting I just reinstalled the appliance from scratch and everything worked.
The Web Interface
Now we can go on and see what we can do.
open a supported browser and go to:
http://<IP address or host name>/admin/
once we have installed the appliance we can finally log I to the web interface that looks like this:
enter the credentials you have created to login.
the interface is quite clean and clear:
with a dashboard reporting the main index and with menu on the top that refers to the various function and operations you can perform on ISE.
on the right upper part there is the Task Navigator that show some standard “wizard style” task to perform.
Task Navigators do not retain information about the tasks you have completed. It is a visual guide that takes you directly to the user interface screens where you perform its related tasks.
the tasks are:
• Setup—Perform the first part of the Cisco ISE setup process. • Profiling—Profile endpoints. • Basic User Authorization—Establish basic user authorization. • ClientProvisioning and Posture—Configure client provisioning and posture. • Basic Guest Authorization—Establish basic guest authorization. • Advanced User Authorization—Establish user authorization, along with client provisioning and posture. • Advanced Guest Authorization—Establish guest authorization, along with client provisioning and posture.
ok it’s late and my arm hurts like hell so I will continue in the next post
Related articles
ISE basic installation and configuration. Part 1 (aitechupdate.wordpress.com)
Configure cisco ISE for Cisco Access Points (aitechupdate.wordpress.com)
Ise Training day 2 « The Puchi Herald: A.I. Tech Update
Ise Training day 2
March 20, 2012antonio ieranoEditLeave a commentGo to comments
Ok my turn to talk today: We talked about one of the most interesting features of ISE, profiling.
Worth to explain a little what profiling is, and what discovery and classification means. it is a very useful and powerful engine but it needs to be understood, also on what it means and why should be used.
other great new, finally ise 1.1 is available on CCO, worth the upgrade absolutely.