By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.
First, it's important to understand what last year's Cisco Systems Inc. announcement really means. Cisco announced that it plans to provide third-party developers with access to IOS application programmer interfaces (APIs) in an effort to promote the development of tools that work with the Internetwork Operating System. Cisco did not state that it will make IOS code open source or available to the public. Realistically speaking, Cisco will likely develop partnerships with software firms, allowing them to write code that integrates with IOS.
Why do I think the decision may improve security? If the initiative pans out, we're likely to see a number of new network management tools that integrate with IOS. In my opinion, anything that allows the simplification of network administration through centralization of effort is an improvement.
Some may worry about a potential exposure of Cisco's source code to hackers, but consider two relevant facts. First, hackers have already stolen copies of IOS source code and posted it on a Russian website. Despite the fact that this theft occurred four years ago, we haven't seen a crippling series of IOS exploits. Second, there are plenty of open source products out there (think Linux) that have excellent security reputations. In fact, the public nature of such source code opens it up to additional scrutiny by the infosec community, a move that often improves the security of the products.
So while it may take time for Cisco's new IOS strategy to bear fruit, I'm confident it will benefit enterprise network security in the long run.
Dig Deeper on Open Source Security Tools and Applications
Related Q&A from Mike Chapple
The OWASP Top Ten list is not a compliance standard but a set of best practices for enterprises looking to boost Web app security. Here's how to get ...continue reading
A data breach notification policy is important to have, but deciding how to alert customers can be tough. Expert Mike Chapple explains some best ...continue reading
Tokenization technology can be confusing. Expert Mike Chapple explains what the difference is between two types of tokens and how tokenization can ...continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.