Tag: cisco

  • Cisco Announces Major Layoffs Despite CEO’s Denial of AI-Related Job Cuts

    Days after CEO Chuck Robbins publicly rejected the idea of laying off employees to make room for artificial intelligence, Cisco Systems announced a new wave of layoffs, removing 157 positions in California.

    The action has drawn legal attention, which has made the company’s attempts to strike a balance between cost containment, shareholder returns, and an expansion strategy driven by AI even more difficult. Employees at a number of Cisco locations will be impacted by the layoffs, with the Milpitas facility seeing the most. According to CRN, 64 more jobs will be lost in San Francisco, while employees at the company’s Pleasanton branch and previous Redwood City headquarters will also be affected.

    According to sources, the positions being terminated range widely, from entry-level workers to top executives, including vice presidents. The layoffs’ timing has drawn criticism. Robbins only stated to CNBC this week that he has no plans to use AI as a cover for cutting staff. He emphasised that he wanted engineers to “innovate faster and be more productive” rather than “fire a bunch of people right now.”

    Strauss Borrelli, a Chicago-based legal firm, has declared that it is looking into whether Cisco complied with the Worker Adjustment and Retraining Notification (WARN) Act, which mandates that companies in the United States give 60 days’ notice before executing mass retirements. In the past, Scott Herren, the chief finance officer at Cisco, referred to job losses associated with AI deployment as a “reallocation versus a headcount savings” effort.

    However, the most recent round comes after two significant worker reductions in the last year: a 5% global decrease in February 2024 and a 7% cut announced in August 2024, both of which the business claimed would maximise shareholder value. Strauss Borrelli stated in a statement that it was investigating whether impacted Cisco workers had been given enough notice and were eligible for benefits and severance pay for 60 days.

    According to reports, employees were notified of the layoffs on August 13th, before the mid-October employment terminations were scheduled. The law firm has questioned whether the correct procedures were followed, even if the dates seem to meet WARN’s standards.

    “We are looking into whether Cisco violated the WARN Act by terminating 157 employees without giving at least 60 days’ notice,” Strauss Borrelli stated. Regarding the legal investigation, the business has not made any public remarks.

    Cisco’s AI Growth Amid Job Cuts

    The layoffs take place as Cisco’s AI-related business is expanding rapidly. The business recently revealed that its AI-related revenues for the fourth quarter of fiscal 2025 totalled $800 million, bringing its yearly total to $2.1 billion. Robbins informed investors that the majority of this revenue was derived from hyperscaler clients, with the other two-thirds being connected to Cisco’s optical portfolio.

    Impact on Employees and Leadership Shake-Up

    Cisco’s strategic investment in AI infrastructure as a long-term growth engine is highlighted by the financial gain. However, it also draws attention to the paradox of reducing employment while announcing record profits from one of the sectors of the economy with the strongest rate of growth.

    Cisco has announced changes to its senior levels in addition to the job losses. According to CRN, Tim Coogan, senior vice-president for U.S. commercial operations, will succeed Rodney Clark as global partner sales head.

    Quick
    Shots

    •Layoffs follow CEO Chuck Robbins’
    public denial of AI-driven job cuts just days earlier.

    •Job losses affect employees across
    levels, including senior executives and vice presidents.

    •Law firm Strauss Borrelli
    investigating potential WARN Act violations over insufficient layoff notice.

    •Cisco reports $2.1B annual revenue
    from AI-related business, highlighting contrast between growth and job cuts.

  • Cisco and NVIDIA Collaborate to Deliver Secure AI Infrastructure

    Cisco and Nvidia have teamed up to provide organisations with secure AI infrastructure, allowing them to set up data centres for AI workloads on a large scale. On March 18, Cisco and NVIDIA revealed an AI factory design that prioritises security. The firms have acted quickly to provide validated reference architectures, building on the broader alliance announced last month with this collaboration with NVIDIA. The firms are working together with NVIDIA to create the Cisco Secure AI Factory, which will significantly streamline the deployment, management, and security of AI infrastructure for businesses of all sizes. According to Cisco CEO and Chair Chuck Robbins, AI can open up revolutionary business potential. Networking and security must be integrated in order to do this. The reliable, cutting-edge solutions from Cisco and NVIDIA enable our clients to easily and safely realise AI’s full potential. NVIDIA founder and CEO Jensen Huang went on to say that AI factories are revolutionising every sector and that security needs to be integrated into every layer to safeguard infrastructure, data, and apps. NVIDIA and Cisco are working together to develop the secure AI blueprint, which will provide businesses with the framework they need to scale AI with confidence and protect their most important assets.

    The Cisco Secure AI Factory and its Operations

    The Cisco Secure AI Factory with NVIDIA is based on the collaboration between Cisco and NVIDIA on the NVIDIA Spectrum-XTM Ethernet networking architecture. Cisco is incorporating security solutions such as Cisco AI Defence to safeguard the creation, implementation, and use of AI models and applications, and Cisco Hypershield to safeguard AI workloads. Cisco and NVIDIA will work together to give clients the freedom to create infrastructure that meets their unique AI requirements without compromising security or ease of use.

    AI factories have to deal with fresh, intricate security issues. The recently released Cisco State of AI Security study highlights significant advancements from a quickly changing AI security ecosystem by analysing over 700 pieces of legislation and dozens of attack vectors unique to AI. Businesses will be more flexible, scale more quickly, and generate commercial value more quickly if they proactively address their AI infrastructure and security issues at the same time. It is anticipated that Cisco Secure AI Factory with NVIDIA would expand on the two organisations’ distinct capacity to provide full-stack technological solutions and adaptable AI networking by utilising the anticipated combined architecture.

    What this New Collaboration will Offer?

    By combining their distinct perspectives on the AI infrastructure requirements of their clients, Cisco and NVIDIA are able to provide flexible deployment options in addition to validated reference architectures. The Secure AI Factory will offer enterprise clients high-performance, scalable AI infrastructure that integrates security at every step of the customer journey. According to Patrick Moorhead, founder, CEO, and chief analyst of Moor Insights & Strategy, companies in today’s dynamic market require end-to-end solutions that tackle their most critical problems rather than merely technology. Together, Cisco and NVIDIA will provide integrated solutions that, in my opinion, will spur innovation, make deployment easier, and optimise processes. Combining the two could be an “easy button” for AI infrastructure, even though AI itself is difficult. They could enable businesses to expedite digital transformation and more confidently accomplish their strategic goals by making AI infrastructure easier to acquire and administer.

  • Top 7 Must-Have Cyber Threat Intelligence Tools

    “Cyber Security is much more than the matter of IT” – Stephane Nappo

    With the increased internet usage, a large amount of personal and professional information and data is available online which is continuously under the threat of exposure. In the USA alone over 53 million individuals were affected due to data compromise in the first half of 2022.

    Source: Statista.com
    Source: Statista.com

    This threat has grown several folds with cyber crimes becoming incredibly sophisticated and the entire world shifting online, especially since 2020 amid the uncertainty and disruption of the global pandemic. As per a survey conducted by Statista, the average cost of data breaches worldwide from March 2020 to March 2022, combined in different sectors, is more than 150 million US dollars.

    Under these circumstances, cyber threat intelligence becomes an extremely valuable tool to protect, detect and respond to any cyber threat your data might be exposed to.

    In this blog, we will discuss in detail cyber threat intelligence and tools that can help you in protecting your data.

    What is Cyber Threat Intelligence?
    Cyber threat intelligence is the collection, processing, and analysis of data to discern the motive and behavior of a potential cyber attack and to help us make informed decisions and implement proactive security procedures. The cyber threat intelligence tools are designed to help us with the process.

    Threat intelligence is a cyclic, continuous process that is typically completed in 6 steps:

    1. Set goals and plan the direction
    2. Collection of data
    3. Processing of data
    4. Analysis of data
    5. Dissemination of data
    6. Report findings

    There are four types of cyber threat intelligence viz. strategic, tactical, technical, and organizational. Each one of these is meant for different users and describes the threat and its details in various depths as per the knowledge and requirement of the concerned user.

    Cyber Threat Intelligence Explained

    What Are Cyber Threat Intelligence Tools?

    Attackers today have learned and developed thousands of ways to breach data and wreak havoc. Also, with advanced technology and software involved, threats have grown more complex and crimes more sophisticated. Therefore, effective and timely detection of threats and strongly powerful retaliation are extremely important for protecting your data.

    Cyber threat intelligence tools are developed and designed to counter these issues. They provide up-to-date information about the latest threats such as malware, exploits, etc. These tools also provide information about the tactic, technology, and procedure (TTP) involved in a particular threat and suggest the best methods for protection against it. Further, these tools are capable of analyzing any potential or specific threat detected on a particular network.

    These tools are capable of managing the risk as well as enhancing your cyber security through artificial intelligence or machine learning. They give an organization the ability to plan preventive measures, detect threats, and resolve security issues.

    Key Features Your Cyber Threat Intelligence Tool Must Have

    As per a survey by Statista, the most useful type of cyber intelligence tool, as per the users, is the one that provides detailed information about the malware being used in the attack.

    Source: Statista.com
    Source: Statista.com

    Although the basic function of most cyber threat intelligence tools remains the same, there are certain key features that you must look for while choosing your CTI.

    Flexibility

    Any cyber threat intelligence tool that you choose must fit in with your already existing security mechanisms including Firewalls and SIEM (Security Information and Event Management).

    A threat intelligence tool processes data from various sources and provides risk scores. Therefore, it cannot act as a standalone tool. Combining it with other security systems enables prioritization, and proactive alerting, as well as adds circumstantial data for alerts that ease the investigation.

    Moreover, this flexibility of function would also let the tool collect accurate data from the dark web and other sources.

    Comprehensible

    A single-window dashboard simplifies the entire process of threat detection and remediation. Being comprehensive the tool collects information from every possible source and displays it together which also accelerates the decision-making process.

    Multiple Source Information

    To exactly analyze an organization’s position in terms of cyber security the tool must be able to extract information from as many sources as possible. Through this real-time indicators can be discovered that can help in forming accurate correlations.

    Alert Quality

    Several security alerts are often ignored owing to a large number of false positives. This causes alert fatigue amongst the security team who are unable to decipher the actual high-priority issues.

    A good threat intelligence tool should be able to prioritize and categorize the actual security alerts, which is only possible when it can correlate the data in the alert with the already available database. This would ensure that the important notifications do receive a response from the security team.

    Proactive Intelligence

    To manage and control security issues a cyber threat intelligence tool must be proactive. This means that the tool should be able to identify the threat and vulnerabilities before the commencement of the actual attack.

    A tool integrated with automated response processes helps in early detection and effective response to the threat.

    Top 7 Cyber Threat Intelligence Tools

    The right threat intelligence tool would help point out the potential issues and nip the problem in the bud. Based on the requirements of users as well as the opinions of the experts we have made a list of the top 7 cyber threat intelligence tools that will secure your system from cyber threats.

    Fortinet’s FortiRecon
    Recorded Future
    Cisco Security Malware Analytics
    Echosec
    IntSights External Threat Protection(ETP) Suite
    ThreatConnect
    ZeroFOX

    Fortinet’s FortiRecon

    Website Fortinet.com
    Rating 4.7
    Demo Provided Yes
    Used For External attack surface monitoring
    Fortinet's Fortirecon - Cyber Threat Intelligence Tool
    Fortinet’s Fortirecon – Cyber Threat Intelligence Tool

    As per Statista, Fortinet led the global threat intelligence software industry in 2022 with almost 39% of the total market share.

    Experts label Fortinet’s FortiRecon as one of the best cyber threat intelligence tools. It is a Digital Risk Protection Service product. Other than its outside-the-network view of the risk, it can also mitigate three additional risk areas viz. Digital assets risk, brand-related risks, and underground & imminent threats. It uses automation, machine learning as well as human intelligence to analyze the brand risk for an organization and deliver proactive custom intel.

    Key Features:

    • External Attack Surface Management
    • Adversary Central Intelligence
    • Extensive asset and exposure discovery
    • Comprehensive reporting

    Pros:

    • Easy to use
    • Contextualized threat insights
    • Early-stage lifecycle protection
    • Far-reaching threat sources
    • Comprehensive report

    Cons:

    • Not suitable for any non-MS domain device
    • Logging services do not include many details

    Pricing:

    Contact the vendor to get the quotes for Fortinet’s Fortirecon threat intelligence license.

    Recorded Future

    Website Recordedfuture.com
    Rating 4.6
    Demo Provided Yes
    Used For Providing coverage against adversaries, infrastructure, and targets
    Recorded Future - Cyber Threat Intelligence Tool
    Recorded Future – Cyber Threat Intelligence Tool

    It is headquartered in Boston cyber security platform. Recorded Future is widely recognized for its predictive or proactive cyber threat intelligence. It gives you real-time visibility into the vast digital ecosystem and automates the entire process of collection, analysis, and reporting. It provides coverage against adversaries, infrastructure, and targets.

    Key Features:

    • Manages risk landscape through a single-platform approach
    • Advance filters to narrow down your search
    • Powerful integration ability connects with both SIEM and SOAR providers
    • Graphical representation of worldwide threat data

    Pros:

    • A wide variety of threat intelligence is covered
    • Direct source evidence for effective decision making
    • Easy navigation owing to modular design
    • 10+ years of reference data updated regularly

    Cons:

    • Overwhelming search results
    • Comparatively expensive, starts at USD 10,000 for AWS

    Pricing:

    Contact Recorded Future to obtain the current pricing of the license.

    Cisco Security Malware Analytics

    Website Cisco.com
    Rating 4.4
    Demo Provided No
    Used For Providing contextual analytics for malware and threats
    Cisco Security Malware Analytics - Cyber Threat Intelligence Tool
    Cisco Security Malware Analytics – Cyber Threat Intelligence Tool

    Earlier recognized by the name threat grid, it is a cloud-based unified security solution. It generates alerts for malware activities and helps analyze the threat levels to draw strategies for tackling them. It provides end-to-end visibility and protection by leveraging threat intelligence.

    Key Features:

    • Contextual analytics for malware and threats
    • Huge malware knowledge base
    • Uses behavioral indicators to predict and prioritize attacks
    • Automation and integration abilities through APIs

    Pros:

    • Easy integration without reprogramming
    • Cross-product security data from Cisco and third-party sources
    • Thorough analysis and comprehensive reporting of threat
    • Automated sample upload through API integration

    Cons:

    • Frequent delays in the alert mechanism
    • Strenuous on-premise appliance setup

    Pricing:

    Contact the vendor to get the quotes for Cisco Security Malware Analytics license.

    Echosec

    Website Flashpoint.io/platform/echosec
    Rating 4.9
    Demo Provided 10 days free trial
    Used For Social media and open source intelligence (OSINT) gathering.
    Echosec - Cyber Threat Intelligence Tool
    Echosec – Cyber Threat Intelligence Tool

    It is a Canada-based company that specializes in Open Source Intelligence Tools (OSINT). Its flagship platform leverages data from social media, the dark web, as well as open community platforms. It collects real-time risk information and allows you to perform ad hoc dark web searches alongside internal threat monitoring.

    Key Features:

    • Pre-built data search filters with 24X7 monitoring.
    • An externally focused tool that connects with global security feeds, illicit forums, etc.
    • Directly feeds information to the co-security tools
    • Collects data from 18 social media platforms, news portals, and blogs

    Pros:

    • Simple and easy-to-use investigative tool
    • Makes investigation easy and provides actionable results quickly
    • Extraordinarily intuitive GUI

    Cons:

    • For any OSINT newbie, the learning curve can be steep
    • Occasional random results require human verification

    Pricing:

    Pricing information for Echosec is supplied by the software provider. Final cost negotiations to purchase Echosec must be conducted with the seller.

    IntSights External Threat Protection(ETP) Suite

    Website Intsights.com
    Rating 3.5
    Demo Provided Yes
    Used For Monitoring phishing attacks, malicious domains, and data breaches
    IntSights External Threat Protection - Cyber Threat Intelligence Tool
    IntSights External Threat Protection – Cyber Threat Intelligence Tool

    It is a 360-degree tool for cyber security that provides rich, real-time, actionable insights within 24 hours. It delivers enterprise-grade external, contextualized, and prioritized threat intelligence. It can be used either as separate modules for external intelligence, risk analysis, and threat investigation or as an end-to-end cyber threat intelligence tool.

    Key Features:

    • It collects data from the dark web, provides external threat feeds, and conducts custom research.
    • Well-built analytical report and automatic risk mitigation
    • Critical vulnerability patching
    • Comes with use-case-specific solutions or APIs for extensible integration capability.

    Pros:

    • Supports all major languages including Japanese, Portuguese, German, French, and others.
    • Focuses on external channels such as social media, black markets, etc.
    • Extremely flexible, adaptable, and comprehensive tool

    Cons:

    • Weak alerting mechanism
    • Steep learning curve

    Pricing:

    Pricing information for IntSights External Threat Protection is supplied by the software provider. Final cost negotiations to purchase IntSights External Threat Protection must be conducted with the seller.

    ThreatConnect

    Website Threatconnect.com
    Rating 4.5
    Demo Provided Yes
    Used For Dealing in threat intelligence, risk quantification, and intelligence-powered security operations
    ThreatConnect - Cyber Threat Intelligence Tool
    ThreatConnect – Cyber Threat Intelligence Tool

    It is a Romania-based company that deals in threat intelligence, risk quantification, and intelligence-powered security operations. It strengthens security and defense by breaking down complex data into actionable information. The information and data collected can be analyzed manually or with automation assistance.

    Key Features:

    • Uses Playbooks which are an intelligence-driven orchestration feature
    • Extensible integration and automation for all cybersecurity features
    • Intuitive dashboard with prioritized risks on the face of it
    • Show threat prevalence through crowdsourcing analytics

    Pros:

    • A powerful data model that establishes links between incidents, threats, and IOCs.
    • Proactive detection through the combination of orchestration and automation.
    • Updated information on the latest cyber threats and malware

    Intro to ThreatConnect

    Cons:

    • One of the most expensive threat intelligence tools
    • Not flexible enough to suit user requirements

    Pricing:

    Pricing information for ThreatConnect is supplied by the software provider. Final cost negotiations to purchase ThreatConnect must be conducted with the seller.

    ZeroFOX

    Website Zerofox.com
    Rating 4.3
    DemoProvided Yes
    Used For Monitoring the web for data leakage and ransomware
    Zerofox - Cyber Threat Intelligence Tool
    Zerofox – Cyber Threat Intelligence Tool

    It is a US-based company that provides cyber intelligence solutions. It safeguards an organization against online threats such as phishing, data leakage, impersonation, and others. It monitors the web for data leakage and ransomware and brings relevant data to the attention of the user.

    Key Features:

    • It is equipped with the latest AI, ML, and OCR technologies
    • Combines artificial intelligence with human intelligence to review and prioritize threats
    • Solely designed for external threat protection
    • Visual indicators on the dashboard offer absolute visibility

    Pros:

    • Hacker elimination through adversary disruption and takedown as a service
    • Huge integration library covering all popular IT tools
    • Streamlined workflow with a straightforward setup process

    Cons:

    • Overwhelming subdomain alerts
    • Generates a large number of false positives

    Pricing:

    Contact ZeroFOX to know about the price of the license.

    Conclusion

    Cyber threat intelligence tools play a crucial role in the growth of any business by protecting it from the commonest and biggest of threats. They identify, predict, alert, and manage cyber attacks. Also, with the number of cyber-attacks rising every year to a great degree and the world shifting online there is no alternative to these tools. However, with a large number of options available in the market, making a final choice can be hard.

    In this article, we shared with you the 7 best cyber threat intelligence tools to make your search convenient. Hope we could help.

    FAQs

    What is Cyber Threat Intelligence?

    Cyber Threat Intelligence is the process of gathering and analyzing information about cyber threats to protect an organization’s digital assets and infrastructure. It provides actionable intelligence to support cyber security strategies and enhance the ability to prevent, detect, and respond to cyber-attacks.

    What are the 3 types of cyber threats?

    • Malware
    • Phishing
    • DDoS (Distributed Denial of Service) Attacks

    What are the benefits of Crime Threat Intelligence tools?

    The benefits of using Cyber Threat Intelligence (CTI) tools are:

    • Improved threat awareness and detection
    • Enhanced incident response
    • Increased efficiency and cost savings
    • Compliance with regulatory requirements

    What is the most common cyber threat?

    The most common type of cyber threat is malware, including viruses, trojans, and ransomware.

  • Cisco – Why Is It Such a Big Name in the Networking Industry?

    Company Profile is an initiative by StartupTalky to publish verified information on different startups and organizations. The content in this post has been approved by Cisco.

    Cisco is a networking equipment corporation, that designs, manufactures, and sells its products. Cisco might not be the only corporation that has developed network nodes. So, what accounts for its victory?

    The name “Cisco” is an acronym for San Francisco, where the company was founded in 1984 by Stanford computer scientists Sandy Lerner and Leonard Bosack. Cisco Systems Inc. is a networking multinational corporation based in the United States.

    Cisco was the very first company to provide routers that could handle several internet protocols. Their early devices were also distinguished by their traditional CPU architecture. Their technology was cutting-edge, and hardware was rarely an issue.

    Cisco isn’t a household brand, but it is well-known. They are one of the world’s largest networking firms, with a market capitalization of over $200B, ranking them at number 64 on the Fortune 500 list.

    Here’s learning all about Cisco, its Founders and Team, Funding and Investors, Business and Revenue Model, Growth, Challenges Faces, Name, Tagline, Logo and more.

    Cisco – Company Highlights‌

    Startup Name Cisco
    Headquarters San Jose, California, United States
    Industry Networking hardware, Networking software
    Founders Leonard Bosack and Sandy Lerner
    Founded December 10, 1984
    Areas Served Worldwide
    Revenue US$49.81 billion (2021)
    Current CEO Chuck Robbins (CEO & Chairman)
    Website www.cisco.com

    Cisco – Latest News
    About Cisco
    Cisco – Logo and Meaning
    Cisco – About Founders and Team
    Cisco – Startup Story
    Cisco – Employees
    Cisco – Business Model
    Cisco – Revenue
    Cisco – Funding and Investors
    Cisco – Investments
    Cisco – Acquisitions
    Cisco – Growth
    Cisco – Competitors
    Cisco – Mistakes and Downfall
    Cisco – Future Plans

    Cisco – Latest News

    As of January 26th, 2022, Cisco released its Data Privacy Benchmark Study for 2022, a yearly worldwide examination of security business practices that emphasizes the influence of privacy on enterprises and their perspectives on data protection.

    Privacy is mission-critical, according to the 2022 research, with 90 per cent of respondents considering it a business requirement. According to the poll, privacy expenditure continues to climb, and businesses see a strong return on investment from privacy spending.

    As of January 20th, 2022, Cisco has announced an extension of the Cisco Catalyst 9000 range, which is built on the powerful Unified Access Data Plane (UADP) ASIC silicon, to provide additional enterprise-grade switching capabilities to the industrial edge for industries like utilities, oil and gas, highways, and rail.

    As companies strive to increase economies, employee safety, and business agility and promote hybrid work, functional connectivity in industrial areas is rising at an exponential rate. As operational technology (OT) devices are integrated onto corporate networks, IT knowledge is necessary to expand and protect the network as the operational world advances.

    About Cisco

    Cisco Systems is a multinational technology corporation headquartered in the United States that specialises in computer networking.

    Cisco networking services link computing devices, and communication networks with people, enabling individuals to access and transmit data regardless of computer system type, location, or time.

    As a company that sold its products mostly to other businesses, Cisco did not become a household name, but in the second decade of the 21st century, it was one of the largest corporations in the United States. Cisco was founded in 1984 and has its headquarters in San Jose, California.‌

    Cisco is the only company that can assert a ‘legacy’ in a market as youthful as networking systems. Cisco’s networks not only carry 85% of all Online traffic; the corporation actively utilizes the Internet to operate its businesses, from purchases made online and stock management to employee evaluations and travelling expenditures.

    Cisco – Logo and Meaning

    The two towers of the Golden Gate Bridge in San Francisco, California, are shown in Cisco’s company logo.

    Cisco Logo
    Cisco Logo

    ‌The company’s engineers were insistent upon using lower case “cisco” in its early years since the term “Cisco” was taken from the city name San Francisco.‌

    Cisco – About Founders and Team

    Cisco was founded by Sandra Lerner and Leonard Bosack.

    Sandra Lerner and Leonard Bosack, founders of cisco
    Sandra Lerner and Leonard Bosack, founders of cisco

    ‌Cisco was created by Sandra Lerner and Leonard Bosack, (then) a married couple who met as students at Stanford University. They continued working at the institution after graduating in 1981, supervising the computer facilities of two distinct departments.

    They were strongly influenced by Standford’s technology from the early 1980s. Bosack used technologies developed by other Stanford employees in the 1970s to connect their individual computer networks.

    He and Lerner realised that router technology, as it was known at the time, could be extremely inexpensively adapted for large-scale usage outside of the institution. Cisco (originally called “Cisco Systems”) was created in December 1984 by the two, who named the business after the city of San Francisco. Cisco eventually bought Stanford’s proprietary technology.

    Cisco’s initial product, a network interface card for Digital Equipment Corporation computers, was introduced in 1985. The next year, it had its first major success with a router that supported numerous network protocols. Lerner was fired from Cisco in 1990, shortly after the firm sold its first stock to the public, and Bosack also quit.

    Chuck Robbins became the CEO of Cisco replacing John Chambers.‌

    Chuck Robbins, CEO of cisco with John Chambers, ex-CEO of cisco
    Chuck Robbins, CEO of cisco with John Chambers, ex-CEO of cisco

    ‌This revitalized the company. Chuck Robbins brought an outside perspective as he had been at that company for the past 17 years and this did help the company as they shifted their focus to cloud-based networking and this picked up the company from the fall.

    They sold to consumer companies like Technicolor for 600 million dollars and invested in newer startups like Velocloud. And in February of 2017, they launched their cloud-based secured internet gateway called Cisco Umbrella. And just 2 years ago, they bought an AI-driven business intelligent company called accompany for 270 million dollars and today they are doing better than ever before.‌


    8 Interesting Facts You Probably Didn’t Know About Sony
    This article brings you the hidden facts about SONY. The facts and information that is still unknown to the masses about this Business Giant.


    Cisco – Startup Story

    Cisco was off to a pretty rough start due to inner conflicts among members, but their small team made things happen.

    In 1985 they sold their very first product which is a network interface card which they sold to Digital Equipment Corporation. But the following year was the one when they came out with their first blade successful product. This was simply a router. What made it special was that it served multiple network protocols. This router was so successful that it required more cash to expand and as the result, it turned to investment.

    In late 1987, the venture capitalist from Sequoia Capital took control of the company. This might have appeared to them as the right thing to do, but it later came back to bite them. Just a couple of months after they came, they changed to the president and CEO of Cisco. The new CEO didn’t get along well with the founders of the company.

    Despite this, the company continued to grow and on February 16, 1990, the company went public on NASDAQ with a market cap of 224 million dollars. But unfortunately soon after, in August 1990, Sandy Lerner and Bosack both left the company. They walked away with 170 million dollars. As for Cisco systems, they were still doing good, but they completely transitioned from a family-owned business to a very corporate business.

    In the early 1990s, they used their savings and put it towards a few part companies like grand junction and similar other companies that formed the capital business unit.‌

    Cisco – Employees

    • Chuck Robbins – Chairman & CEO
    • Eric Wenger – Senior Director, Technology Policy, Global Government Affairs
    • Matt Swartz – Principal Engineer
    • Bill Gerhardt – Managing Director – Strategy and Business Development
    • Tal Schierau – Sr. Director, Customer Experience
    • Caroline Baker – Executive Producer, Unhackable with Mike Storm, a Security Podcast Series
    • Jon Koplin – Managing Director EMEAR, Cisco Investments and Corporate Development
    • Kelly Crothers – Director of Employee Experience

    ‌‌Cisco – Business Model

    Cisco earns money through selling networking and communications hardware and software, which represents the Internet’s backbone.

    • Applications: The selling of software-oriented services that sit on top of Infrastructure Platforms, such as collaboration (Cisco TelePresence, for example), analytics software, and, the internet of things (IoT) generates revenue.
    • Infrastructure Platforms: The selling of fundamental networking technologies such as routing, switching, data centre devices, and wireless yields revenue.
    • Services: The provision of support services and technical consulting generates revenue.
    • Security and Other products: Revenues are derived from the sale of threat detection, management and security products and cloud and system management tools. This segment also used to house the company’s Service Provider Video Software and Solutions business, which was hived off in 2018.

    “The networks that we build we’re going to have to think about fundamentally differently, there is no room for technology religion,” Mr. Robbins said.

    Over more than three decades, Cisco Systems became a Silicon Valley giant partly because of one facet of its business: technological complexity.

    Managing Cisco’s many varieties of networking equipment, which help computers exchange data, became such a convoluted process over time that customers who learned to do so became loath to try competing products. But that pattern can’t go on, according to Chuck Robbins, Cisco’s chief executive, who took over the company in 2015. At Cisco’s annual technology conference, he declared that technical shifts were affecting how all companies used the internet, forcing Cisco to rewrite its product playbook.‌


    Infosys Success Story | Founders | Business Model | Revenue Model
    Infosys is an information technology consulting company making digital dreams come true. Know more about Infosys’s funding, business, revenue models etc.


    Cisco – Revenue

    Year Amount Percentage Increase/Decrease from last year
    2021 $49.818B +1.05%
    2020 $49.301B -5.02%
    2019 $51.904B +5.22%

    Cisco – Funding and Investors

    Cisco has raised a total of $2.5M in funding over 1 round. This was a Series A round raised on Jan 1, 1987.‌

    Date Stage Amount Investor
    Jan 1, 1987 Series A $2.5M Sequoia Capital

    Cisco – Investments

    Cisco has made 210 investments. Their most recent investment was on Oct 7, 2020, when Illusive Networks raised $24M.‌

    Date Stage Amount Organization Name
    Oct 7, 2020 Series B $24M Illusive Networks
    Aug 5, 2020 Grant $25k Respira Labs
    Apr 2, 2020 Series C $230M Illusive Networks
    Jan 29, 2020 Venture Round $8.6M Illusive Networks
    Oct 30, 2019 Venture Round $7.6M Illusive Networks
    Mar 20, 2019 Series C $27M Illusive Networks
    Mar 12, 2019 Venture Round $50M Illusive Networks
    Jan 2, 2019 Series G $10M Illusive Networks
    Dec 1, 2018 Grant $300k Illusive Networks
    Oct 3, 2018 Series D $30M Illusive Networks

    Cisco – Acquisitions

    A total of 237 businesses have been acquired by Cisco. A few of them are as follows:

    Acquiree Name About Acquiree Date Amount
    Replex Replex provides software solutions. Oct 25, 2021
    Epsagon Epsagon is a privately held, modern observability company with offices in New York and Tel Aviv. Aug 13, 2021 $500M
    Kenna Security Kenna is a SaaS risk and vulnerability intelligence platform that accurately measures risk and prioritizes remediation efforts. May 14, 2021
    Socio Powering in-person, virtual, and hybrid event success. May 12, 2021
    Sedona Systems Sedona Systems is a creator of an IP/optical converged control platform May 11, 2021 $100M
    Dashbase Dashbase empowers you to deliver high quality VoIP services. Dec 22, 2020
    Slido Slido is an audience interaction platform for meetings and events. Dec 7, 2020
    IMImobile IMImobile is a cloud communication software that helps users manage customer interactions at scale. Dec 7, 2020 £543M
    Banzai Cloud Bringing Cloud Native to the Enterprise Nov 16, 2020
    Portshift Kubernetes-native security solution, single pane of glass for containers and Kubernetes security. Oct 1, 2020

    Cisco – Growth

    Cisco Systems Inc. has been on a goal for the past few years: to conquer the data networking business, just like IBM did with mainframe computers and Microsoft and Intel did with pcs.

    Cisco, situated in San Jose, Calif., has gone on a significant acquisition binge to achieve this lofty aim, purchasing 14 firms since late 1993. Cisco evolved and adapted to its ever-changing surroundings. During the mid to late 1990s, Cisco adapted to the internet protocol as the internet age progressed.

    They introduced devices such as the ASA 5200 and GSR (Gigabit Switch Router) routers, but the dot-com bubble, like that of any other technological business at the time, had a significant impact on their growth. But, more than any other technological business, Cisco was able to reap the rewards of the dot-com bubble.

    Cisco had become the most valuable firm in the world by late March 2000, after surpassing Apple in the game. When the dot-com market collapsed, Cisco Systems, like Oracle and Dell, suffered a huge drop. However, because none of the firms had achieved the same heights as Cisco Systems, they were not as badly affected.

    Cisco Systems intends to dominate its industry and has already made 237 acquisitions since its inception. While many acquisitions are stressful, Cisco’s revenues and net profits have more than quadrupled since 1996. The key is to look for organisational synergies before making a purchase.‌


    Dell | American multinational company | Company Profile |
    Founded by Michael Dell, Dell develops, sells and repairs computer related products. Know more about it’s business model, future plans, success story etc.


    Cisco – Competitors

    The circumstances in the early 2000s provided an ideal opportunity for Cisco’s competitors to enter the market. Juniper Networks, the largest rival, was adamant about passing the IP and MPL package. They published their first part a few years before in 1999, but this is when they started to take off.

    Cisco’s market share was eroding, and they now own 30% of the market. Cisco swiftly countered by introducing more powerful processing cards and GSR routers. A6 are application-specific integrated circuits, which they created as well.

    They were particularly popular with Bitcoin and theory mining, and in 2004, they began migrating to CSR-1, a new high-level platform. They also received IOS-XR, a new software architecture. Cisco was able to recover from the dot-com bubble thanks to these reforms, and it began to thrive again.

    Cisco – Mistakes and Downfall

    Cisco made the mistake of attempting to become a household name in 2006. They began by renaming themselves Cisco rather than Cisco Systems. They’ve also spent a lot of time and money advertising links to these items, as well as their prospective consumer costs.

    They were also attempting to focus on their conventional business at the same time. They were also seeking to expand globally and enter new markets while all of this was going on. For example, they attempted to develop a foothold in India by investing $1 billion in a global centre of ease in Bangalore.

    They were also attempting to acquire their way into new markets on top of all of this. But here’s the thing: one person can only do so many things at once and be effective at all of them. And Cisco’s attempt to achieve all of these things at the same time was doomed to fail. Despite their efforts, their opponents were rapidly gaining momentum.

    They faced domestic rivalry from Juniper Networks, as well as international competition from Huawei, which has recently gained a lot of attention. Cisco’s revenues were so low as a result of all of this that they chose to slash their spending by $1 billion each year in 2011. What precisely did they do to achieve this?

    Mostly by laying off workers. They fired 3000 people right away, and hundreds more were granted early retirement packages and other benefits. After everything was said and done, 10,000 jobs were lost, accounting for 14% of their workforce. Cisco was clearly in a poor situation.

    Cisco sold eastbound lines to Belkin International in 2013, and this interchanged from the consumer to the network side. Years of mistakes, however, continued to have disastrous repercussions. They had to reduce 4000 and 6000 positions in 2013 and 2014, respectively.

    Cisco – Future Plans

    Over the previous two decades, Cisco has reaped the benefits of the internet’s growth and increased traffic. Cisco predicts that worldwide network traffic would expand by 26% annually until 2022, thanks to the expansion of online services such as video streaming and gaming.

    “Innovation requires focused investment, the right team and a culture that values imagination,” said Chuck Robbins, chairman and CEO of Cisco. “We are dedicated to transforming the industry to build a new internet for the 5G era. Our latest solutions in silicon, optics and software represent the continued innovation we’re driving that helps our customers stay ahead of the curve and create new, ground-breaking experiences for their customers and end users for decades to come.”

    Cisco intends to bring its 75,000 employees back into the office once the epidemic has passed, while still allowing for remote work. After converting its entire worldwide staff to remote work, the IT giant is taking efforts to ensure that employees can continue to work from home, such as strengthening networks to allow for more remote access to corporate databases.

    “How can we improve the robustness and resilience of our networks and connectivity?” “How do we scale up much more effectively,” Cisco’s chief operating officer, Irving Tan, explained. “There’s a lot to learn, and it’s still early in the game.” By equipping individuals and businesses with problem-solving skills and revolutionary technology through Cisco Networking Academy, they want to offer the advantages of digitalization to one billion people by 2025.

    Cisco – FAQs

    What does Cisco do?

    Cisco Systems is a multinational technology corporation based in the United States that specialises in communication networks.

    When was Cisco founded?

    Leonard Bosack and Sandy Lerner founded cisco on December 10, 1984.

    How does cisco make money?

    Cisco earns money through selling networks and telecommunications software and hardware, which represents the Internet’s backbone.