Cisco 2014 Annual Report Download - page 16

Download and view the complete annual report

Please find page 16 of the 2014 Cisco annual report below. You can navigate through the pages in the report by either clicking on the pages listed below, or by using the keyword search tool below to find specific information within the annual report.

Page out of 140

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140

In fiscal 2014, the Connected Mobile Experience (CMX), a Wi-Fi location data analytics platform we introduced in fiscal
2013, continued to experience positive momentum as customers seek new monetization opportunities. Our fiscal 2013
acquisitions of Meraki, Inc. (“Meraki”), a cloud-managed networking company, and ThinkSmart Technologies Limited, a
specialist in Wi-Fi data location analytics, in our view bolster our Unified Access platform by providing scalable, easy-to-
deploy, on-premise networking solutions that can be centrally managed from the cloud.
Security
With the IoE creating what we believe to be a potentially significant opportunity, security is a significant business concern,
and we believe it is a top investment priority of our customers. More people, processes, and devices than ever before are
connected to the Internet, causing an escalation of security threats which can result in—where such security threats become
actual security breaches—loss of revenue, intellectual property, and reputation. Our security portfolio of products and services
is designed to offer a comprehensive solution that collects and shares intelligence with a coordinated focus on threats across
the entire attack continuum—before, during, and after an attack. These solutions include network security, web and email
security, cloud web security, advanced malware protection, data center security, and network admission control and identity
services. Our security solutions and services are designed to protect customers from the network to the cloud to the endpoint,
through a network-integrated architecture.
During the first quarter of fiscal 2014, we completed our acquisition of Sourcefire, a provider of intelligent cybersecurity
solutions. Sourcefire delivers innovative, highly automated security through continuous awareness, threat detection, and
protection across its portfolio, including next-generation intrusion prevention systems, next-generation firewalls, and advanced
malware protection. In fiscal 2014 we announced new solutions in advanced malware protection and network security that
included integration of our Sourcefire products with products obtained from our fiscal 2013 acquisition of Cognitive Security.
We also introduced OpenAppID, an open source application detection solution designed to allow customers to create, share,
and implement custom application detection so they can address new application-based threats as quickly as possible.
In the fourth quarter of fiscal 2014, we acquired ThreatGRID, Inc., a leader in dynamic malware analysis and threat
intelligence technology. ThreatGRID’s private and public cloud technology combines dynamic malware analysis with
analytics and actionable indicators with the goal of enabling security teams to proactively defend against and quickly respond
to advanced cyber attacks and malware outbreaks. With the ThreatGRID acquisition, we aim to strengthen our advanced threat
protection security offering.
Other Products
Our Other Products category primarily consists of certain emerging technologies and other networking products.
Service
In addition to our product offerings, we provide a broad range of service offerings, including technical support services and
advanced services.
Technical support services help our customers ensure their products operate efficiently, remain available, and benefit from the
most up-to-date system and application software that we have developed. These services help customers protect their network
investments, manage risk, and minimize downtime for systems running mission-critical applications. A key example of this is
our Cisco Smart Services offering, which leverages the intelligence from Cisco’s millions of devices and customer
connections to protect and optimize network investment for our customers and partners.
Advanced services are part of a comprehensive program that is focused on providing responsive, preventive, and consultative
support of our technologies for specific networking needs. The advanced services program supports networking devices,
applications, solutions, and complete infrastructures. Our service and support strategy is focused on capitalizing on increased
globalization, and we believe this strategy, along with our architectural approach, has the potential to further differentiate us
from competitors.
8