Events , Network Detection & Response , RSA Conference

The Role of Identity in Network Security

Cisco's Tom Gillis on the Latest Security Trends and Challenges
Tom Gillis, senior vice president and general manager of Cisco Security

It’s a familiar pattern: A new threat appears on the horizon, organizations get hacked and teams of security vendors offer new security tools to defend the enterprise. Over time, many security organizations have acquired hundreds of tools, and instead of being more secure, detection and analysis across a broad spectrum of solutions is even harder.

See Also: Corelight's Brian Dye on NDR's Role in Defeating Ransomware

Tom Gillis, senior vice president and general manager of the Security Business Group at Cisco, said security teams are pushing back on the point solutions in favor of an integrated platform with comprehensive identity controls - from the user to the device and down to the software process level.

These days, customers want an "integrated solution from a single vendor that looks across multiple domains. This is where we think identity is a key component in the platform," Gillis said.

In this video interview with Information Security Media Group at RSA Conference 2024, Gillis also discussed:

  • Findings from Cisco's latest Duo 2024 Trusted Access Report;
  • The role of identity in the new security perimeter;
  • Factors driving stronger authentication methods.

At Cisco, Gillis oversees the company's global security business, with a motive to simplify the security experience for its customers. Prior to Cisco, Gillis served as the senior vice president and general manager of VMware's Network and Advanced Security Business Group. He also served as CEO and co-founder of Bracket Computing, which was later acquired by VMware.


About the Author

Tom Field

Tom Field

Senior Vice President, Editorial, ISMG

Field is responsible for all of ISMG's 28 global media properties and its team of journalists. He also helped to develop and lead ISMG's award-winning summit series that has brought together security practitioners and industry influencers from around the world, as well as ISMG's series of exclusive executive roundtables.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing cuinfosecurity.com, you agree to our use of cookies.