Transforming IT
Showing results for 
Search instead for 
Do you mean 

Hey Cisco, Hey Poncho ... "We don't need no stinking open networking"

TSchreider on ‎11-22-2013 06:50 AM

200px-Ciscocomics.jpgSince 1907, The Cisco Kid has been a popular fictional character found in numerous movies, radio, televisions shows and comic books.  Today, the new Cisco Kid is a technology network behemoth that has a fictional approach to Software-Defined-Networking (SDN) that even The Register has captioned as comical.  Cisco's new sidekick Poncho is Insieme, a $750 million spin-in strategy investment where Cisco hopes to protect its large networking hardware revenue stream by coating it with the veil of SDN.  Unfortunately, what results is more hardware tied to proprietary software residing in a closed ecosystem.


Cisco would counter this with their position that they have published numerous APIs within their data model. This however, is a far cry from HP's adoption of OpenFlow as well as other open standards to offer true SDN that provides maximum flexibility for its customers. How can something be open if you have to highly customize it in order for it to communicate with the core equipment your IT ecosystem relies?


So where is the security play here in my blog? Well it is in Cisco's launch of their App-Centric Security tools.  When I review their market announcement of their SDN security play, I see seemingly cool features; however, only available for their products - hardly the open format the industry is moving toward. I agree that being able to manage all their firewalls and security appliances as a single pane of glass is cool, but what about the myriad of other security tools that we all use? Oh right, the library of APIs they offer. I don't know about you, but I would rather spend my time protecting what's important than writing APIs.  Remember the promise of open Identity Management (IdM) systems and connectors and APIs? Enough said.


I would like to be regaled with your stories of encounters with the new Cisco Kid, drop me a line and let me know how you feel about open vs. closed SDN security approaches.

About the Author


Tari is a Distinguished Technologist with 30 years of IT and cyber security experience. He is dual board certified in information security/business continuity and is responsible for a wide range of management and technology consulting services encompassing information security, disaster recovery, privacy, and risk management. His problem-solving skills, knowledge of various technology platforms, compliance statutes, industries, as well as his experience in deploying defense-in-depth and InfoSec Program solution architectures is commonly applied when advising CIOs/CISOs as well as leveraged in numerous HP client engagements throughout the world. Tari has designed, built, and managed some of the world’s largest InfoSec programs allowing them to defend against even the most aggressive attackers.

Leave a Comment

We encourage you to share your comments on this post. Comments are moderated and will be reviewed
and posted as promptly as possible during regular business hours

To ensure your comment is published, be sure to follow the Community Guidelines.

Be sure to enter a unique name. You can't reuse a name that's already in use.
Be sure to enter a unique email address. You can't reuse an email address that's already in use.
Type the characters you see in the picture above.Type the words you hear.
1-3 December 2015
Discover 2015 London
Discover 2015 in London, the ultimate showcase technology event for business and IT professionals to learn, connect, and grow.
Read more
November 2015
Software Online Expert Days
Join us online to talk directly with our Software experts.
Read more
View all