Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Cloud Security

New Security, Compliance Features Added to Cisco Spark

Cisco announced on Monday that it has added some important security, compliance and analytics features to its Spark collaboration platform.

Cisco announced on Monday that it has added some important security, compliance and analytics features to its Spark collaboration platform.

Launched in March 2015, Cisco Spark provides cloud-based tools for team messaging, online meetings and whiteboarding. One year after its launch, the company announced $150 million in funding to drive application development for Spark.

Cisco has now announced four major improvements to Spark, including end-to-end message encryption and compliance features typically required in enterprise environments, such as e-discovery and data loss prevention.

Another data protection feature allows organizations to protect sensitive assets against attacks targeting the Cisco Collaboration Cloud by running an on-premises key server to encrypt and decrypt data sent to Spark. This way, customers benefit from Spark’s capabilities while having the data security equivalent of on-premises storage.

The latest improvements made to the Spark platform also aim to help IT and security teams address the challenges posed by bring-your-own-device (BYOD) initiatives. Cisco Spark now includes device and application management features that allow administrators to enable device-level PIN lock, automatic logout for apps running outside the company network, and enterprise certificate pinning to protect users from malicious hotspots.

Cisco has also added analytics capabilities to help IT teams determine if users are experiencing call quality problems. Administrators can easily obtain data from their browser via what Cisco calls “fluid analytics,” which is available for both Spark and WebEx.

Cisco Spark

The four new Spark features are available through the new Spark Control Hub, the new Pro Pack and third-party integrations.

The Control Hub is a tool that allows administrators to provision and manage Spark services, and view analytics data. The Pro Pack for the Control Hub is a premium offer for organizations that require more control and more advanced capabilities.

Advertisement. Scroll to continue reading.

Cisco has teamed up with various companies to provide Pro Pack capabilities. Actiance and Global Relay provide compliance and archiving services, while Cisco’s Cloudlock, Symantec and Skyhigh Networks provide data loss prevention capabilities. Identity management is provided by Okta, Microsoft Azure Active Directory, and Ping Identity.

Related: Cisco Releases Open Source Malware Signature Generator

Related: Apple, Cisco Partner to Improve Cyber Insurance Policies

Related: Corvil Integrates its Security Analytics Into Cisco’s Tetration Platform

Written By

Eduard Kovacs (@EduardKovacs) is a managing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Understand how to go beyond effectively communicating new security strategies and recommendations.

Register

Join us for an in depth exploration of the critical nature of software and vendor supply chain security issues with a focus on understanding how attacks against identity infrastructure come with major cascading effects.

Register

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

Data Protection

The cryptopocalypse is the point at which quantum computing becomes powerful enough to use Shor’s algorithm to crack PKI encryption.

Identity & Access

Zero trust is not a replacement for identity and access management (IAM), but is the extension of IAM principles from people to everyone and...

Artificial Intelligence

The CRYSTALS-Kyber public-key encryption and key encapsulation mechanism recommended by NIST for post-quantum cryptography has been broken using AI combined with side channel attacks.

CISO Conversations

SecurityWeek talks to Billy Spears, CISO at Teradata (a multi-cloud analytics provider), and Lea Kissner, CISO at cloud security firm Lacework.

Cyber Insurance

Cyberinsurance and protection firm Boxx Insurance raises $14.4 million in a Series B funding round led by Zurich Insurance.

Cloud Security

Cloud security researcher warns that stolen Microsoft signing key was more powerful and not limited to Outlook.com and Exchange Online.

CISO Strategy

Okta is blaming the recent hack of its support system on an employee who logged into a personal Google account on a company-managed laptop.