{"id":32214,"date":"2019-12-09T05:00:00","date_gmt":"2019-12-09T05:00:00","guid":{"rendered":"https:\/\/www.threatshub.org\/blog\/whats-hot-for-cisco-in-2020\/"},"modified":"2019-12-09T05:00:00","modified_gmt":"2019-12-09T05:00:00","slug":"whats-hot-for-cisco-in-2020","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/whats-hot-for-cisco-in-2020\/","title":{"rendered":"What\u2019s hot for Cisco in 2020"},"content":{"rendered":"<p>As the industry gets ready to gear up for 2020 things have been a&nbsp; little disquieting in networking land.<\/p>\n<p>That\u2019s because some key players \u2013 <a href=\"https:\/\/seekingalpha.com\/article\/4310076-buying-opportunity-arista-networks?dr=1&amp;utm_medium=email&amp;utm_source=seeking_alpha\" rel=\"nofollow\">Arista<\/a> and Juniper in particular \u2013 have been reporting business slowdowns as new deals have been smaller than expected and cloud providers haven\u2019t been as free-spending as in the past.<\/p>\n<aside class=\"fakesidebar\"><a href=\"https:\/\/www.networkworld.com\/newsletters\/signup.html\">[Get regularly scheduled insights by signing up for Network World newsletters.]<\/a><\/aside>\n<p>Worldwide IT spending has been on the slow side, Gartner said in October that worldwide <a href=\"https:\/\/www.gartner.com\/en\/newsroom\/press-releases\/2019-10-23-gartner-says-global-it-spending-to-grow-3point7-percent-in-2020\" rel=\"nofollow\">IT spending is projected to total $3.7 trillion in 2019<\/a>, an increase of 0.4% from 2018, the lowest growth forecast so far in 2019. The good news: global IT spending is expected to rebound in 2020 with forecast growth of 3.7%, primarily due to enterprise software spending, Gartner stated.<\/p>\n<aside id=\"fsb-3065\" class=\"fakesidebar fakesidebar-auto fakesidebar-sponsored\">\n<aside class=\"nativo-promo\">\n<div class=\"excerpt-img bugblog ntv-preview-img-wrapper\" id=\"ntvImageBox\"><img alt=\" Take the Intelligent Route with Consumption-Based Storage\" title=\"Take the Intelligent Route with Consumption-Based Storage\" data-original=\"https:\/\/images.idgesg.net\/images\/article\/2019\/09\/hpe_nww_post4-100811448-medium.3x2.jpg\" class=\"lazy\" loading=\"lazy\"><\/div>\n<div class=\"excerpt-text\">\n<p class=\"post-meta\"><span class=\"sponsored-blog\">BrandPost<\/span> <span class=\"post-byline\">Sponsored by HPE<\/span><\/p>\n<p class=\"crawl-headline\"><a href=\"https:\/\/www.networkworld.com\/article\/3440100\/take-the-intelligent-route-with-consumption-based-storage.html?utm_source=IDG&amp;utm_medium=promotions&amp;utm_campaign=HPE20773&amp;utm_content=sidebar\" title=\" Take the Intelligent Route with Consumption-Based Storage\" target=\"_blank\" rel=\"noopener noreferrer\">Take the Intelligent Route with Consumption-Based Storage<\/a><\/p>\n<p class=\"crawl-summary\">Combine the agility and economics of HPE storage with HPE GreenLake and run your IT department with efficiency.<\/p>\n<\/div>\n<\/aside>\n<\/aside>\n<aside class=\"fakesidebar\"><a href=\"https:\/\/www.networkworld.com\/article\/3446044\/network-pros-react-to-new-cisco-certification-curriculum.html\">Network pros react to new Cisco certification curriculum<\/a><\/aside>\n<h2><strong>Cisco good and bad<\/strong><\/h2>\n<p>The bellwether Cisco was the latest to note this \u201cbusiness softness\u201d laying blame on the world economy in general terms and slower than expected enterprise deals in its latest quarter more specifically.<\/p>\n<p>After its Q1 2020 financial call in November Cisco took the additional action of revamping some of its business units and leadership with an eye towards increasing its competitive tactics \u2013 primarily in the cloud arena. For example it rolled its Enterprise Networking and Data Center networking teams into one group, and that includes cloud computing.<\/p>\n<p>As a whole from the Cisco point of view things aren\u2019t gloomy by any means. In fact one of the company\u2019s core-strategy shifts \u2013 a move to a software and subscription model&nbsp;\u2013 is clearly going well. Software subscriptions are now at 71% of the vendor\u2019s total software revenue, up 12 points year-over-year, according to CEO Chuck Robbins. Comparatively four years ago that number was a third or less, he said.&nbsp;<\/p>\n<aside class=\"nativo-promo nativo-promo-1 smartphone\" id><\/aside>\n<p>And that is good for Cisco as a business, Robbins said. \u201cThis transition to software not only aligns to how our customers want to consume our technology, but we also believe it will lessen the impact of macroeconomic shifts in the future.\u201d<\/p>\n<h2>Cisco dances in the cloud<\/h2>\n<p>Software in a variety of forms will be the focus&nbsp; for Cisco in 2020, and perhaps no area will be more important than its hybrid-cloud-interconnect strategy.<\/p>\n<aside class=\"nativo-promo nativo-promo-1 tablet desktop\" id><\/aside>\n<p>\u201cCisco will continue to have a significant focus on tying together cloud offerings from AWS, Microsoft, Google and other different cloud manifestations as it looks to help bring consistency across and mitigate the complexity of hybrid-cloud environments,\u201d said Brad Casemore, IDC research vice president for data-center networks.<\/p>\n<p>Foretelling the importance the company puts on cloud interconnect integration, in December <a href=\"https:\/\/www.networkworld.com\/article\/3487563\/cisco-goes-deep-into-aws-hybrid-cloud-with-sd-wan-security-outposts-data-center-support.html\">Cisco tied ever-closer to AWS<\/a> by extending its SD-WAN technology to manage and automate connectivity between branch offices and the AWS Cloud via the <a href=\"https:\/\/aws.amazon.com\/transit-gateway\/\" rel=\"nofollow\">AWS Transit Gateway<\/a>, which lets customers connect their Amazon Virtual Private Clouds (VPCs) and their on-premises networks to a single gateway.<\/p>\n<p>With this new support customers will be able to apply network segmentation and security policies to cloud traffic flows. The package will also enable policy exchange between Cisco SD-WAN Controller and AWS Transit Gateway, which will let IT teams implement consistent network and data security rules, said Sachin Gupta, senior vice president, product management, with Cisco Enterprise Networking.<\/p>\n<h2>Growing ACI<\/h2>\n<p>Casemore also expects Cisco will further enhance its <a href=\"https:\/\/www.networkworld.com\/article\/3336075\/cisco-serves-up-flexible-data-center-options.html\">Application Centric Infrastructure (ACI) Anywhere<\/a> technology, which gives customers the flexibility to run and control applications anywhere they want across private or public clouds or at the edge while maintaining consistent network and security &nbsp;policies across their entire domain.<\/p>\n<aside class=\"nativo-promo nativo-promo-2 tablet desktop smartphone\" id><\/aside>\n<p>ACI Anywhere lets policies configured through Cisco\u2019s SDN&nbsp; Application Policy Infrastructure Controller (APIC) use native APIs offered by a public-cloud provider to orchestrate changes within both the private and public cloud environments, Cisco said. Cisco\u2019s Orchestrator helps provision and manage the implementation across multiple sites and services.<\/p>\n<p>The driving force with ACI Anywhere is that IT teams have been forced to make a hard choice: Stay with their on-premises data centers with a rich set of tools of their choice for automation or assurance or security; or move to the cloud, where a different set of capabilities can make consistent compliance a true challenge. ACI Anywhere removes that challenge and places workloads where it makes the most sense regardless of the platform or hypervisor, Cisco says.<\/p>\n<p>Cisco has embarked on this ACI Anywhere expansion strategy already. In addition to its SD-WAN extension to AWS in December, Cisco also extended ACI Anywhere to AWS Outposts.&nbsp; Outposts offers AWS-designed hardware that lets customers run compute and storage on premises, while connecting to AWS\u2019s cloud services.<\/p>\n<p><a href=\"https:\/\/www.networkworld.com\/article\/3439448\/cisco-spreads-aci-to-microsoft-azure-multicloud-and-sd-wan-environments.html\">In September Cisco<\/a> added new pieces of ACI Anywhere that integrates Microsoft Azure clouds and a cloud-only implementation of ACI. It also <a href=\"https:\/\/www.networkworld.com\/article\/3388679\/cisco-taps-into-aws-for-data-center-cloud-applications.html\">rolled out Cisco Cloud ACI for AWS<\/a> that lets users configure inter-site connectivity, define policies and monitor the health of network infrastructure across hybrid environments, Cisco said.<\/p>\n<p>\u201cCisco will deepen the functionality of ACI in multicloud environments and move closer to intelligent automation of these system to ease operational complexity,\u201d Casemore said.<\/p>\n<p>Others think Cisco needs to take bolder steps towards integrating hybrid clouds.<\/p>\n<p>\u201cOverall, I think it\u2019s clear that Cisco needs to get into \u2018the cloud\u2019 in a more effective way.&nbsp; I think their recent reorg shows they understand that,\u201d said analyst <a href=\"https:\/\/blog.cimicorp.com\/?p=3943\" rel=\"nofollow\">Tom Nolle, president of CIMI Corp<\/a>. \u201cCloud Interconnect is a sideshow,&#8221; he said. &#8220;What\u2019s needed is infrastructure-independent development and deployment, which would relegate \u2018cloud interconnect\u2019 to nothing but a network gateway.\u201d&nbsp;<\/p>\n<p>&nbsp;\u201cCloud players like VMware and Amazon are already thinking of cloud interconnect holistically, as a broad resource partnership that lets all clouds, all data centers, edge and core, all coexist under a common \u2018resource pool\u2019 model,\u201d Nolle continued.&nbsp; \u201cRival <a href=\"https:\/\/newsroom.juniper.net\/press-releases\/juniper-networks-announces-intent-acquire-htbase\" rel=\"nofollow\">Juniper bought HTBASE<\/a>, which could have accomplished that for Juniper if they really understood their own acquisition. Cisco needs to recognize this broader vision, and get a place in it.\u201d<\/p>\n<h2>More SD-WAN<\/h2>\n<p>While the cloud is a big growth area for Cisco, it will also further develop SD-WAN, which is a big deal because IDC says almost 95% of enterprises expect to be using it within 24 months. Cisco takes that a step further and says that as of August 2019, 70% of the Fortune 100 are using some form of Cisco\u2019s SD-WAN. In addition, Cisco\u2019s <em>2019 Global Networking Trends Survey,<\/em> found that over 58% of organizations globally have deployed SD-WAN in some form, and over 94% believe they will deploy some form of it within the next two years.<\/p>\n<p>It\u2019s also a big deal because Cisco late this year said it had 20,000 customers using its SD-WAN across its Viptela and Meraki lines.<\/p>\n<p>The transition to SD-WAN is accelerating, thanks to the pervasive adoption of cloud services. Businesses are adopting SaaS apps like Microsoft Office365 and others, wrote Cisco\u2019s Gupta in a <a href=\"https:\/\/blogs.cisco.com\/enterprise\/why-20000-customers-trust-cisco-for-sd-wan-solutions\" rel=\"nofollow\">blog about its SD-WAN customers<\/a>. \u201cOur surveys show our customers have, on average, 30 paid SaaS applications each. And that they are actually using many more: over 100 in several cases,\u201d he wrote.<\/p>\n<p>SD-WAN is critical for businesses adopting cloud services, acting as a connective tissue between the campus, branch, IoT, data center and cloud, Gupta said. \u201cIt brings all the network domains together and delivers the outcomes business requires,&#8221; he said. &#8220;It must align user and device policies, and provide assurance to meet application service-level agreements. It must deliver robust security to every device and every cloud that the enterprise\u2019s data touches.\u201d<\/p>\n<p>What\u2019s critical for Cisco is the intersection and integration of the network and security \u2013 it is moving them closer together. That\u2019s particularly important in the SD-WAN arena as those two technologies become intertwined., said Lee Doyle, principal analyst at Doyle Research. \u201cYou\u2019ll see tighter integration and a more consolidated approach at the branch so customers won\u2019t have to manage so many piece-parts individually,\u201d Doyle said.<\/p>\n<p class=\"xmsonormal\">What\u2019s critical for Cisco is the intersection and integration of the network and security \u2013 they are moving them closer together. That\u2019s particularly important in the SD-WAN arena as those two technologies become intertwined.<\/p>\n<p>Hints of this tighter integration came last month when <a href=\"https:\/\/www.networkworld.com\/article\/3452003\/cisco-meraki-ups-security-with-new-switch-software.html\">Cisco Meraki<\/a> rolled out a software feature called Adaptive Policy that lets businesses group users, applications and devices so they can apply security policies based on client, intent, and identity. Adaptive Policy is an extension of Cisco\u2019s enterprise Software-Defined Access software that customers can group users and devices within networked segments according to their access privileges.<\/p>\n<p>The idea is to secure user, device and application access to microservices, containers, and other applications from one location, Cisco said.<\/p>\n<p>Meraki also tied in tighter with Cisco\u2019s cloud-based Umbrella security gateway.&nbsp; According to Cisco, Umbrella can provide the first line of defense against threats on the Internet. By analyzing and learning from internet activity patterns, Umbrella automatically uncovers attacker infrastructure and blocks requests to malicious destinations before connections are established and without adding latency. It is meant to stop phishing and malware infections earlier, identify already infected devices faster and prevent data exfiltration, Cisco says.<\/p>\n<p>\u201cConsolidation at the branch will be a key push for Cisco as they have all the security and networking technology to make SD-WAN and branch implementations better. They will consolidate and extend those technologies,\u201d IDC\u2019s Casemore said.<\/p>\n<p>Cisco sees the future here, but it\u2019s really centered around a Kubernetes ecosystem that includes both deployment and application development, both cloud-native and legacy, monolithic application models, Nolle said. \u201cConnection tools like SDN and SD-WAN, and computing models like edge computing, are all slaves to application development and deployment, and Cisco needs to step up its game there,\u201d Nolle added.&nbsp;<\/p>\n<h2>Security integration<\/h2>\n<p>Better security for cloud interconnect, SD-WAN and other environments will be an area where experts expect Cisco to show a lot of activity.&nbsp;<\/p>\n<p>That will reveal itself in continued efforts to interlock and integrate security as the company moves toward more holistic security, Casemore says. &#8220;One of these key areas will be around the evolution of its Tetration product towards more workload, cloud-protection areas,\u201dhe said.<\/p>\n<p>Introduced in 2016, Cisco Tetration Analytics gathers information from hardware and software sensors and analyzes the information using Big Data analytics and machine learning to offer IT managers a deeper understanding of their data-center, private- and public-cloud resources.<\/p>\n<p><a href=\"https:\/\/www.cisco.com\/c\/en\/us\/td\/docs\/data-center-analytics\/tetration-analytics\/sw\/release-notes\/cta_rn_3_3_2_2.html\" rel=\"nofollow\">Tetration<\/a> includes the ability to improve enterprise-security monitoring and simplify operational reliability. Another key benefit of Tetration is as single tool to collect consistent security telemetry across the entire data center and analyze large volumes of data in real time.&nbsp; In a multi-cloud enterprise, Tetration can lock-down tens of millions of whitelist policy entries across thousands of applications and offer application segmentation to support secure zero-trust implementations.<\/p>\n<p>Cisco\u2019 defines zero trust as an all-inclusive approach to securing authentication and access, while offering segmentation and policy-setting capabilities across an organization&#8217;s networks and applications. It is one of the strategies put forth to protect all things cloud across the industry, experts say. Gartner predicts that by 2023, 60% of enterprises will phase out most of their VPNs in favor of zero-trust network access.<\/p>\n<p>In Cisco\u2019s case customers can expect the company to continue adding zero-trust capabilities across its software portfolio.<\/p>\n<p>A recent <a href=\"https:\/\/reprints.forrester.com\/#\/assets\/2\/971\/RES146875\/reports\" rel=\"nofollow\">Forrester Wave report<\/a> stated that Cisco has spent significant time and expense to realign much of its security portfolio to enable or enhance zero trust, includng integrating and operationalizing authentication, supported by technology it acquired with Duo. &#8220;The integration of Duo&#8217;s strong authentication offering and the simplicity of its UIs and tooling have strengthened the Cisco offering considerably,\u201d Forrester wrote.<\/p>\n<p>Cisco <a href=\"https:\/\/www.networkworld.com\/article\/3310198\/cisco-sets-2-3b-deal-for-unified-access-multi-factor-authentication-security-firm-duo.html\">paid $2.35 billion in cash and stock for network-identity, authentication and security company Duo in 2018<\/a>. Cisco says Duo helps protect against breaches with cloud-based software that verifies the identity of users and the health of their devices before granting access to applications.<\/p>\n<p>\u201cThe combination of Cisco&#8217;s networking and device-tooling, new offerings for analytics and cloud workloads, and Duo&#8217;s focus on users and endpoints supports multiple components of ZTX,\u201d Forrester wrote. \u201cDeployment and ease of use are strengths across the portfolio.&#8221; The report describes Cisco as a well-positioned zero-trust player.\u201d<\/p>\n<h2>Challenges in 2020<\/h2>\n<p>\u201cCisco\u2019s challenge here is that the right steps include upgrading their SD-WAN products to include specific zero-trust connectivity management, and they\u2019re afraid to do that because it might overhang their existing security products,\u201d said Nolle. \u201cThey need to broaden their vision of security to envelop SD-WAN but also to secure cloud-native, Kubernetes-distributed applications.&#8221;<\/p>\n<p>Zero trust is also reflected in Cisco\u2019s overarching security <a href=\"https:\/\/www.cisco.com\/c\/dam\/en\/us\/products\/collateral\/security\/threat-response-aag.pdf\" rel=\"nofollow\">Threat Response<\/a> platform which includes a number of core Cisco products, among them Umbrella, advanced malware protection for endpoints, and intrusion protection.<\/p>\n<p>Experts predict Cisco will continue to fill out and improve integrations with its threat platform especially where it involves the cloud and access at the network edge, exeperts said.<\/p>\n<p>Cisco says its security business grew 22% year-over-year from Q1 2020 to Q1 2019, and experts expect the company to continue that success in 2020.<\/p>\n<div class=\"end-note\">\n<div id class=\"blx blxParticleendnote blxM2005 blox4_html blxC23909\">Join the Network World communities on <a href=\"https:\/\/www.facebook.com\/NetworkWorld\/\" target=\"_blank\" rel=\"noopener noreferrer\">Facebook<\/a> and <a href=\"https:\/\/www.linkedin.com\/company\/network-world\" target=\"_blank\" rel=\"noopener noreferrer\">LinkedIn<\/a> to comment on topics that are top of mind.<\/div>\n<\/div>\n<p>READ MORE <a href=\"https:\/\/www.networkworld.com\/article\/3487831\/what-s-hot-for-cisco-in-2020.html#tk.rss_security\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>\nAs the industry gets ready to gear up for 2020 things have been a\u00a0 little disquieting in networking land.That\u2019s because some key players \u2013 Arista and Juniper in particular \u2013 have been reporting business slowdowns as new deals have been smaller than expected and cloud providers haven\u2019t been as free-spending as in the past.[Get regularly scheduled insights by signing up for Network World newsletters.]<br \/>\nWorldwide IT spending has been on the slow side, Gartner said in October that worldwide IT spending is projected to total $3.7 trillion in 2019, an increase of 0.4% from 2018, the lowest growth forecast so far in 2019. The good news: global IT spending is expected to rebound in 2020 with forecast growth of 3.7%, primarily due to enterprise software spending, Gartner stated.To read this article in full, please click here READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[738],"tags":[1253,812,762,307,764],"class_list":["post-32214","post","type-post","status-publish","format-standard","hentry","category-networkworld","tag-cloud-computing","tag-data-center","tag-networking","tag-security","tag-software"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>What\u2019s hot for Cisco in 2020 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/whats-hot-for-cisco-in-2020\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What\u2019s hot for Cisco in 2020 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/whats-hot-for-cisco-in-2020\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2019-12-09T05:00:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"432\" \/>\n\t<meta property=\"og:image:height\" content=\"435\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"11 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/whats-hot-for-cisco-in-2020\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/whats-hot-for-cisco-in-2020\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"What\u2019s hot for Cisco in 2020\",\"datePublished\":\"2019-12-09T05:00:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/whats-hot-for-cisco-in-2020\\\/\"},\"wordCount\":2199,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"keywords\":[\"cloud computing\",\"Data Center\",\"Networking\",\"Security\",\"Software\"],\"articleSection\":[\"Networkworld\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/whats-hot-for-cisco-in-2020\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/whats-hot-for-cisco-in-2020\\\/\",\"name\":\"What\u2019s hot for Cisco in 2020 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"datePublished\":\"2019-12-09T05:00:00+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/whats-hot-for-cisco-in-2020\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/whats-hot-for-cisco-in-2020\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/whats-hot-for-cisco-in-2020\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"cloud computing\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/cloud-computing\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"What\u2019s hot for Cisco in 2020\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What\u2019s hot for Cisco in 2020 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/whats-hot-for-cisco-in-2020\/","og_locale":"en_US","og_type":"article","og_title":"What\u2019s hot for Cisco in 2020 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/whats-hot-for-cisco-in-2020\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2019-12-09T05:00:00+00:00","og_image":[{"width":432,"height":435,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"11 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/whats-hot-for-cisco-in-2020\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/whats-hot-for-cisco-in-2020\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"What\u2019s hot for Cisco in 2020","datePublished":"2019-12-09T05:00:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/whats-hot-for-cisco-in-2020\/"},"wordCount":2199,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"keywords":["cloud computing","Data Center","Networking","Security","Software"],"articleSection":["Networkworld"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/whats-hot-for-cisco-in-2020\/","url":"https:\/\/www.threatshub.org\/blog\/whats-hot-for-cisco-in-2020\/","name":"What\u2019s hot for Cisco in 2020 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"datePublished":"2019-12-09T05:00:00+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/whats-hot-for-cisco-in-2020\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/whats-hot-for-cisco-in-2020\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/whats-hot-for-cisco-in-2020\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"cloud computing","item":"https:\/\/www.threatshub.org\/blog\/tag\/cloud-computing\/"},{"@type":"ListItem","position":3,"name":"What\u2019s hot for Cisco in 2020"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/32214","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=32214"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/32214\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=32214"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=32214"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=32214"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}