Enhances enterprise security architecture and adds anti-malware, security intelligence, and forensics Last week while I was on vacation, Cisco was hard at work when it announced that it was buying Sourcefire for $2.7 billion. Now that I’m back, I’ve got to blog about this deal.Before I get into the details, I have to give Cisco a lot of credit on this one. By grabbing Sourcefire, Cisco management was in effect admitting that information security needed to be a much bigger part of its overall strategy and that it couldn’t achieve this goal in a timely manner with its existing portfolio of security products. During CiscoLive (i.e. Cisco’s customer conference held in June), John Chambers confessed, “we are not our customer’s primary security vendor and that’s got to change.” This acquisition proves that Chambers is willing to put Cisco’s money where his mouth is. For a network hardware company, this decision took a lot of guts. So what does Cisco get for its money? Plenty! With this acquisition, Cisco just jumped back into a position of network security leadership in a big way. Cisco gets:1. An established network security architecture. Sourcefire’s next-generation IPS strategy is well ahead of the market and a clear alternative to all the NGFW hoopla. Cisco will merge Sourcefire’s architecture with the grand vision it outlined at CiscoLive adding instant substance to its plan for security policy enforcement throughout the network. 2. An anti-malware play. Sourcefire FireAMP and FirePOWER network security appliances combine for advanced malware protection (and forensic data capture) on networks and endpoints. This is a rather unique combination as most vendors offer one or the other (i.e. network and endpoint protection) but not both. For the most part, Cisco has been absent from this market, watching Damballa, FireEye, and Trend Micro grab the lead. Now it can use its massive distribution channel to push Sourcefire broadly as a competitive alternative and a key component of its overall architecture.3. Additional security intelligence. Cisco is betting on a distributed architecture that combines network-based policy enforcement with constant security intelligence updates like IP and URL reputation lists from Cisco Security Intelligence Operations (SIO). With Sourcefire, Cisco adds security intelligence about advanced malware to its cloud and its customers’ policy enforcement decisions. Additionally, Sourcefire endpoint forensic data collection can help Cisco align CIO with specific information and intelligence that can be customized for individual customers. In aggregate, Sourcefire contributes market leading network security products and services to strong Cisco assets like TrustSec and ISE. Cisco can now pivot in any business or technology direction from a cybersecurity and networking perspective. Yup, Cisco should be able to combine Sourcefire assets, its massive installed base, and global distribution engine into a positive outcome. To maximize success, Cisco should also:1. Use Sourcefire as an engine to accelerate its security architecture. As previously mentioned, Cisco announced a security architecture at CiscoLive which was long on vision but a bit vague on execution. Since Sourcefire is well ahead in the integrated architecture game, Cisco should make sure that it becomes the tip of the sphere for enterprise security deals in order to compete with HP, IBM, McAfee, and Symantec security architectures.2. Embrace open source. One of Sourcefire’s keys to success was its strong leadership and management of the SNORT community but these folks will likely be a bit nervous about Cisco’s commitment to SNORT moving forward. Cisco must nip this in the bud with appropriate announcements, enhanced support across its product line, and further investment in SNORT development and support.3. Push on open standards. As Cisco merges its own products and intelligence with those of Sourcefire, it would be well served to glue everything together using open standards. For example, all intelligence descriptions and feeds could be based upon the Structured Threat Information Expression (STIX) and the Trusted Automated Exchange of Indicator Information (TAXII) developed by DHS and Mitre. Cisco’s commitment to open standards could set a precedent for the security industry while streamlining enterprise architecture integration. A true win/win for customers. Related content analysis 5 things security pros want from XDR platforms New research shows that while extended detection and response (XDR) remains a nebulous topic, security pros know what they want from an XDR platform. By Jon Oltsik Jul 07, 2022 3 mins Intrusion Detection Software Incident Response opinion Bye-bye best-of-breed? ESG research finds that organizations are increasingly integrating security technologies and purchasing multi-product security platforms, changing the industry in the process. By Jon Oltsik Jun 14, 2022 4 mins Security Software opinion SOC modernization: 8 key considerations Organizations need SOC transformation for security efficacy and operational efficiency. Technology vendors should come to this year’s RSA Conference with clear messages and plans, not industry hyperbole. By Jon Oltsik Apr 27, 2022 6 mins RSA Conference Security Operations Center opinion 5 ways to improve security hygiene and posture management Security professionals suggest continuous controls validation, process automation, and integrating security and IT technologies. By Jon Oltsik Apr 05, 2022 4 mins Security Practices Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe