Next-Generation Technologies & Secure Development , Security Operations

The Challenge of Securing SD-WAN

Integrating Security Controls Into the Network Infrastructure
Jeff Reed, senior vice president, Cisco

As "software-defined" becomes a ubiquitous trend, a change in the approach to software-defined networking is needed, says Cisco's Jeff Reed.

See Also: Corelight's Brian Dye on NDR's Role in Defeating Ransomware

In a video interview with Information Security Media Group at RSA Conference 2019 in San Francisco, Reed discusses:

  • The evolution to "software-defined everything";
  • Managing controls and data egress;
  • Recommendations for security teams.

Reed is senior vice president of product management for Cisco's security business. Previously, Reed was senior vice president of Cisco's Enterprise Infrastructure and Solutions Group, and formerly had responsibility for the company's SDN solutions and architectures for enterprise customers. Additionally he was general manager for Cisco's largest switching business unit, the Unified Access Group. Prior to joining Cisco, Reed held a number of senior positions in large-scale enterprise software businesses. He also served as president and co-founder of an e-commerce start-up venture.


About the Author

Varun Haran

Varun Haran

Managing Director, Asia & Middle East, ISMG

Haran has been a technology journalist in the Indian market for over six years, covering the enterprise technology segment and specializing in information security. He has driven multiple industry events such as the India Computer Security Conferences (ICSC) and the first edition of the Ground Zero Summit 2013 during his stint at UBM. Prior to joining ISMG, Haran was first a reporter with TechTarget writing for SearchSecurity and SearchCIO; and later, correspondent with InformationWeek, where he covered enterprise technology-related topics for the CIO and IT practitioner.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.