{"id":24608,"date":"2019-01-23T11:00:00","date_gmt":"2019-01-23T11:00:00","guid":{"rendered":"https:\/\/www.threatshub.org\/blog\/durham-county-goes-cisco-for-enterprise-network-ops-and-security-proficiency\/"},"modified":"2019-01-23T11:00:00","modified_gmt":"2019-01-23T11:00:00","slug":"durham-county-goes-cisco-for-enterprise-network-ops-and-security-proficiency","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/durham-county-goes-cisco-for-enterprise-network-ops-and-security-proficiency\/","title":{"rendered":"Durham County goes Cisco for enterprise network ops and security proficiency"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/images.idgesg.net\/images\/article\/2018\/08\/6_network_packet-analysis_data_binary_world-100768040-large.3x2.jpg\" class=\"ff-og-image-inserted\"\/><\/div>\n<p>The government in <a href=\"https:\/\/en.wikipedia.org\/wiki\/Durham_County,_North_Carolina\" rel=\"nofollow\">Durham County<\/a>, N.C., was spending hours and hours manually provisioning its network and keeping security policies current, so it decided two and a half years ago to upgrade for the sake of efficiency and security.<\/p>\n<p>Since then, the government\u2019s IT staff of four has migrated its traditional point-to-point network to a more modern enterprise featuring the software-defined technologies of Cisco\u2019s Application Centric Infrastructure (ACI) and DNA Center that support its 2,100 enterprise end users and online services for 315,000 county residents.\u00a0<\/p>\n<aside class=\"fakesidebar\"><strong>[ Read also: <a href=\"https:\/\/www.networkworld.com\/article\/3284352\/data-center\/how-to-plan-a-software-defined-data-center-network.html\">How to plan a software-defined data center network<\/a> ]<\/strong><\/aside>\n<p>As a result, time spend on certain manual chores has plummeted, freeing up staff time for forward-looking projects.<\/p>\n<p><a href=\"https:\/\/www.networkworld.com\/article\/3251826\/lan-wan\/cisco-adds-new-capabilities-to-its-ibn-infrastructure.html\">ACI<\/a> is Cisco\u2019s overarching software-defined networking (SDN) technology for data center and cloud networks.\u00a0<a href=\"https:\/\/www.networkworld.com\/article\/3280988\/cisco\/cisco-opens-dna-center-network-control-and-management-software-to-the-devops-masses.html\">DNA Center<\/a> is the heart of ACI, featuring automation capabilities, assurance setting, fabric provisioning and policy-based segmentation for enterprise networks.<\/p>\n<h2>40Gbps fiber ring links five data centers<\/h2>\n<p>Durham\u2019s core data center is distributed among four \u2013 soon to be five \u2013 buildings over a dark-fiber ring in Durham, creating a 40Gbps network backbone serving the data centers and 55 remote sites across the county. That includes seven libraries, social services, the heath department and other critical public services locations.<\/p>\n<p>\u201cWe utilize leased lines from two different vendors with various speeds to connect remote sites to our central data center and have redundant internet circuits with speeds up to 1 gig to improve business continuity and connect all sites to the internet,\u201d said <a href=\"https:\/\/www.linkedin.com\/in\/joel-bonestell-8131025\/\" rel=\"nofollow\">Joel Bonestell<\/a>, the network and security services manager for <a href=\"https:\/\/www.dconc.gov\/\" rel=\"nofollow\">Durham County government<\/a>.<\/p>\n<p>The network includes Cisco Nexus 9000s in a spine-and-leaf configuration and integrates a range of other networked gear, including security cameras and load balancers. ACI and DNA Center control this environment and give the county\u2019s IT staff a single point of control, reducing the overall complexity of its data center operations.<\/p>\n<p>\u201cWe embarked on this project some two and a half years ago when our traditional data center model \u2013 where we manually configured each node and spent days making the simplest manual upgrades\u00a0\u2013 to an environment where we can now make configuration and security updates in minutes across the data center,\u201d Bonestell said.<\/p>\n<h2>Dramatic time savings for network and securtiy tasks<\/h2>\n<p>Bonestell said manual network provisioning took some 40 minutes, and updating or creating a new security policy took about 60 minutes. With ACI deployed, it takes about four minutes to provision \u2013 a 90 percent reduction \u2013 and about five minutes to update security policies \u2013 a 91 percent reduction.<\/p>\n<p>&#8220;In the past we spent about 80 percent of our time and resources maintaining the network and 20 percent on new projects or improving services and innovation,&#8221; Bonestell said. &#8220;Now we have more time for new and innovative projects that will benefit our residents and businesses with new capabilities and services.&#8221;<\/p>\n<p>For example, Bonestell\u2019s group has been able to help its applications development team build new a program to remind citizens of court dates and a mobile app for submitting documents to the county. \u201cOur ultimate vision is to <a href=\"https:\/\/www.networkworld.com\/article\/3223189\/virtualization\/how-network-automation-can-speed-deployments-and-improve-security.html\">automate<\/a> as much as possible,\u201d he said.\u00a0<\/p>\n<p> READ MORE <a href=\"https:\/\/www.networkworld.com\/article\/3335018\/lan-wan\/durham-county-goes-cisco-for-enterprise-network-ops-and-security-proficiency.html#tk.rss_security\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>\nThe government in Durham County, N.C., was spending hours and hours manually provisioning its network and keeping security policies current, so it decided two and a half years ago to upgrade for the sake of efficiency and security.Since then, the government\u2019s IT staff of four has migrated its traditional point-to-point network to a more modern enterprise featuring the software-defined technologies of Cisco\u2019s Application Centric Infrastructure (ACI) and DNA Center that support its 2,100 enterprise end users and online services for 315,000 county residents.\u00a0 [ Read also: How to plan a software-defined data center network ]<br \/>\nAs a result, time spend on certain manual chores has plummeted, freeing up staff time for forward-looking projects.To read this article in full, please click here(Insider Story) READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":24609,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[738],"tags":[812,740,1045,806,2767,762,1109,307],"class_list":["post-24608","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-networkworld","tag-data-center","tag-idg-insider","tag-mobilewireless","tag-network-management","tag-network-monitoring","tag-networking","tag-sdn","tag-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Durham County goes Cisco for enterprise network ops and security proficiency 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/durham-county-goes-cisco-for-enterprise-network-ops-and-security-proficiency\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Durham County goes Cisco for enterprise network ops and security proficiency 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/durham-county-goes-cisco-for-enterprise-network-ops-and-security-proficiency\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2019-01-23T11:00:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/01\/durham-county-goes-cisco-for-enterprise-network-ops-and-security-proficiency.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"700\" \/>\n\t<meta property=\"og:image:height\" content=\"467\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/durham-county-goes-cisco-for-enterprise-network-ops-and-security-proficiency\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/durham-county-goes-cisco-for-enterprise-network-ops-and-security-proficiency\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Durham County goes Cisco for enterprise network ops and security proficiency\",\"datePublished\":\"2019-01-23T11:00:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/durham-county-goes-cisco-for-enterprise-network-ops-and-security-proficiency\\\/\"},\"wordCount\":523,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/durham-county-goes-cisco-for-enterprise-network-ops-and-security-proficiency\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/01\\\/durham-county-goes-cisco-for-enterprise-network-ops-and-security-proficiency.jpg\",\"keywords\":[\"Data Center\",\"IDG Insider\",\"Mobile&amp;Wireless\",\"Network Management\",\"Network Monitoring\",\"Networking\",\"SDN\",\"Security\"],\"articleSection\":[\"Networkworld\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/durham-county-goes-cisco-for-enterprise-network-ops-and-security-proficiency\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/durham-county-goes-cisco-for-enterprise-network-ops-and-security-proficiency\\\/\",\"name\":\"Durham County goes Cisco for enterprise network ops and security proficiency 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/durham-county-goes-cisco-for-enterprise-network-ops-and-security-proficiency\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/durham-county-goes-cisco-for-enterprise-network-ops-and-security-proficiency\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/01\\\/durham-county-goes-cisco-for-enterprise-network-ops-and-security-proficiency.jpg\",\"datePublished\":\"2019-01-23T11:00:00+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/durham-county-goes-cisco-for-enterprise-network-ops-and-security-proficiency\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/durham-county-goes-cisco-for-enterprise-network-ops-and-security-proficiency\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/durham-county-goes-cisco-for-enterprise-network-ops-and-security-proficiency\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/01\\\/durham-county-goes-cisco-for-enterprise-network-ops-and-security-proficiency.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/01\\\/durham-county-goes-cisco-for-enterprise-network-ops-and-security-proficiency.jpg\",\"width\":700,\"height\":467},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/durham-county-goes-cisco-for-enterprise-network-ops-and-security-proficiency\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Data Center\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/data-center\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Durham County goes Cisco for enterprise network ops and security proficiency\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Durham County goes Cisco for enterprise network ops and security proficiency 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/durham-county-goes-cisco-for-enterprise-network-ops-and-security-proficiency\/","og_locale":"en_US","og_type":"article","og_title":"Durham County goes Cisco for enterprise network ops and security proficiency 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/durham-county-goes-cisco-for-enterprise-network-ops-and-security-proficiency\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2019-01-23T11:00:00+00:00","og_image":[{"width":700,"height":467,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/01\/durham-county-goes-cisco-for-enterprise-network-ops-and-security-proficiency.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/durham-county-goes-cisco-for-enterprise-network-ops-and-security-proficiency\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/durham-county-goes-cisco-for-enterprise-network-ops-and-security-proficiency\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Durham County goes Cisco for enterprise network ops and security proficiency","datePublished":"2019-01-23T11:00:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/durham-county-goes-cisco-for-enterprise-network-ops-and-security-proficiency\/"},"wordCount":523,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/durham-county-goes-cisco-for-enterprise-network-ops-and-security-proficiency\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/01\/durham-county-goes-cisco-for-enterprise-network-ops-and-security-proficiency.jpg","keywords":["Data Center","IDG Insider","Mobile&amp;Wireless","Network Management","Network Monitoring","Networking","SDN","Security"],"articleSection":["Networkworld"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/durham-county-goes-cisco-for-enterprise-network-ops-and-security-proficiency\/","url":"https:\/\/www.threatshub.org\/blog\/durham-county-goes-cisco-for-enterprise-network-ops-and-security-proficiency\/","name":"Durham County goes Cisco for enterprise network ops and security proficiency 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/durham-county-goes-cisco-for-enterprise-network-ops-and-security-proficiency\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/durham-county-goes-cisco-for-enterprise-network-ops-and-security-proficiency\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/01\/durham-county-goes-cisco-for-enterprise-network-ops-and-security-proficiency.jpg","datePublished":"2019-01-23T11:00:00+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/durham-county-goes-cisco-for-enterprise-network-ops-and-security-proficiency\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/durham-county-goes-cisco-for-enterprise-network-ops-and-security-proficiency\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/durham-county-goes-cisco-for-enterprise-network-ops-and-security-proficiency\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/01\/durham-county-goes-cisco-for-enterprise-network-ops-and-security-proficiency.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/01\/durham-county-goes-cisco-for-enterprise-network-ops-and-security-proficiency.jpg","width":700,"height":467},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/durham-county-goes-cisco-for-enterprise-network-ops-and-security-proficiency\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Data Center","item":"https:\/\/www.threatshub.org\/blog\/tag\/data-center\/"},{"@type":"ListItem","position":3,"name":"Durham County goes Cisco for enterprise network ops and security proficiency"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/24608","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=24608"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/24608\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/24609"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=24608"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=24608"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=24608"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}