Misplaced Pages

Wi-Fi Protected Setup

Article snapshot taken from Wikipedia with creative commons attribution-sharealike license. Give it a read and then ask your questions in the chat. We can research this topic together.

Wi-Fi Protected Setup ( WPS ), originally Wi-Fi Simple Config , is a network security standard to create a secure wireless home network .

#976023

70-404: Created by Cisco and introduced in 2006, the purpose of the protocol is to allow home users who know little of wireless security and may be intimidated by the available security options to set up Wi-Fi Protected Access , as well as making it easy to add new devices to an existing network without entering long passphrases. It is used by devices made by HP, Brother and Canon for their printers. WPS

140-422: A "fuzzy checksum" reduces the body text to its characteristic minimum, then generates a checksum in the usual manner. This greatly increases the chances of slightly different spam emails producing the same checksum. The ISP spam detection software, such as SpamAssassin , of co-operating ISPs, submits checksums of all emails to the centralised service such as DCC . If the count of a submitted fuzzy checksum exceeds

210-448: A 2009 purchase of mobile specialist Starent Networks . Cisco continued to be challenged by both domestic competitors Alcatel-Lucent , Juniper Networks , and an overseas competitor Huawei . Due to lower-than-expected profit in 2011, Cisco reduced annual expenses by $ 1 billion. The company cut around 3,000 employees with an early-retirement program who accepted a buyout and planned to eliminate as many as 10,000 jobs (around 14 percent of

280-505: A brute-force attack in progress, which disables the PIN method for long enough to make the attack impractical. In the summer of 2014, Dominique Bongard discovered what he called the Pixie Dust attack. This attack works only on the default WPS implementation of several wireless chip makers, including Ralink, MediaTek, Realtek and Broadcom. The attack focuses on a lack of randomization when generating

350-415: A cash-and-equity deal. Checksum A checksum is a small-sized block of data derived from another block of digital data for the purpose of detecting errors that may have been introduced during its transmission or storage . By themselves, checksums are often used to verify data integrity but are not relied upon to verify data authenticity . The procedure which generates this checksum

420-406: A certain threshold, the database notes that this probably indicates spam. ISP service users similarly generate a fuzzy checksum on each of their emails and request the service for a spam likelihood. A message that is m bits long can be viewed as a corner of the m -dimensional hypercube . The effect of a checksum algorithm that yields an n -bit checksum is to map each m -bit message to

490-410: A cloud API platform that simplifies the addition of real-time communications and collaboration capabilities within applications. On June 30, 2015, Cisco acquired privately held OpenDNS , the company best known for its DNS service that adds a level of security by monitoring domain name requests. On August 6, 2015, Cisco announced that it has completed the acquisition of privately held MaintenanceNet,

560-454: A corner of a larger hypercube, with dimension m + n . The 2 corners of this hypercube represent all possible received messages. The valid received messages (those that have the correct checksum) comprise a smaller set, with only 2 corners. A single-bit transmission error then corresponds to a displacement from a valid corner (the correct message and checksum) to one of the m adjacent corners. An error which affects k bits moves

630-565: A decade virtually unchanged. The company was quick to capture the emerging service provider environment, entering the SP market with product lines such as Cisco 7000 and Cisco 8500. Between 1992 and 1994, Cisco acquired several companies in Ethernet switching , such as Kalpana , Grand Junction and most notably, Mario Mazzola 's Crescendo Communications, which together formed the Catalyst business unit. At

700-543: A definitive agreement to acquire Sourcefire for $ 2.7 billion. On August 14, 2013, Cisco Systems announced it would cut 4,000 jobs from its workforce, which was roughly 6%, starting in 2014. At the end of 2013, Cisco announced poor revenue due to depressed sales in emerging markets, caused by economic uncertainty and by fears of the National Security Agency planting backdoors in its products. In April 2014, Cisco announced funding for early-stage firms to focus on

770-734: A market capitalization of $ 224 million, and was listed on the NASDAQ stock exchange. On August 28, 1990, Lerner was fired. Upon hearing the news, her husband Bosack resigned in protest. Although Cisco was not the first company to develop and sell dedicated network nodes, it was one of the first to sell commercially successful routers supporting multiple network protocols. Classical, CPU-based architecture of early Cisco devices coupled with flexibility of operating system IOS allowed for keeping up with evolving technology needs by means of frequent software upgrades. Some popular models of that time (such as Cisco 2500 ) managed to stay in production for almost

SECTION 10

#1732854527977

840-480: A meaningful share of the packet-optical market, revenues were still not on par with US$ 7 billion price tag paid in 1999 for Cerent . Some of acquired technologies (such as Flip from Pure Digital) saw their product lines terminated. Cisco announced on March 15, 2012, that it would acquire NDS Group for $ 5bn. The transaction was completed on July 30, 2012. In January 2013, Cisco Systems acquired Israeli software maker Intucell for around $ 475 million in cash,

910-692: A message, the receiver adds all the words in the same manner, including the checksum; if the result is not a word full of zeros, an error must have occurred. This variant, too, detects any single-bit error, but the pro modular sum is used in SAE J1708 . The simple checksums described above fail to detect some common errors which affect many bits at once, such as changing the order of data words, or inserting or deleting words with all bits set to zero. The checksum algorithms most used in practice, such as Fletcher's checksum , Adler-32 , and cyclic redundancy checks (CRCs), address these weaknesses by considering not only

980-578: A move to expand its mobile network management offerings. In the same month, Cisco Systems acquired Cognitive Security, a company focused on Cyber Threat Protection. Cisco also acquired SolveDirect (cloud services) in March 2013 and UK -based Ubiquisys (mobile software) in April 2013 for $ 310 million. Cisco acquired cyber-security firm Sourcefire , in October 2013. On June 16, 2014, Cisco announced that it has completed

1050-513: A product design consulting firm that helped develop Cisco's Flip video camera. Also in 2010, Cisco became a key stakeholder in e-Skills Week . In March 2011, Cisco completed the acquisition of privately held network configuration and change management software company Pari Networks. Although many buy-ins (such as Crescendo Networks in 1993, Tandberg in 2010) resulted in acquisition of flagship technology to Cisco, many others have failed—partially or completely. For instance, in 2010 Cisco occupied

1120-501: A variety of companies to spin products and talent into the company. In 1995–1996 the company completed 11 acquisitions. Several acquisitions, such as Stratacom , were one of the biggest deals in the industry when they occurred. During the Internet boom in 1999, the company acquired Cerent Corporation , a start-up company located in Petaluma, California , for about US$ 7 billion. It was

1190-520: Is a wireless method that is used to connect certain Wi-Fi devices such as printers and security cameras to the Wi-Fi network without using any password. In addition, there is another way to connect called WPS Pin that is used by some devices to connect to the wireless network. Wi-Fi Protected Setup allows the owner of Wi-Fi privileges to block other users from using their household Wi-Fi. The owner can also allow people to use Wi-Fi. This can be changed by pressing

1260-901: Is also included in the S&;P 500 , Nasdaq-100 , the Russell 1000 , and the Russell 1000 Growth Stock indices. Cisco Systems was founded in December 1984 by Sandy Lerner along with her husband Leonard Bosack . Lerner was the director of computer facilities for the Stanford University Graduate School of Business . Bosack was in charge of the Stanford University computer science department's computers. Cisco's initial product has roots in Stanford University's campus technology. In

1330-496: Is an even number of '1's. To check the integrity of a message, the receiver computes the bitwise exclusive or of all its words, including the checksum; if the result is not a word consisting of n zeros, the receiver knows a transmission error occurred. With this checksum, any transmission error which flips a single bit of the message, or an odd number of bits, will be detected as an incorrect checksum. However, an error that affects two bits will not be detected if those bits lie at

1400-417: Is called a checksum function or checksum algorithm . Depending on its design goals, a good checksum algorithm usually outputs a significantly different value, even for small changes made to the input. This is especially true of cryptographic hash functions , which may be used to detect many data corruption errors and verify overall data integrity ; if the computed checksum for the current data input matches

1470-540: Is implementation-dependent, as Wi-Fi router manufacturers could defend against such attacks by slowing or disabling the WPS feature after several failed PIN validation attempts. A young developer based out of a small town in eastern New Mexico created a tool that exploits this vulnerability to prove that the attack is feasible. The tool was then purchased by Tactical Network Solutions in Maryland. They state that they have known about

SECTION 20

#1732854527977

1540-451: Is the key used to hash the data. All WPS methods are vulnerable to usage by an unauthorized user if the wireless access point is not kept in a secure area. Many wireless access points have security information (if it is factory-secured) and the WPS PIN printed on them; this PIN is also often found in the configuration menus of the wireless access point. If this PIN cannot be changed or disabled,

1610-401: Is transferred through a new Information Element (IE) that is added to the beacon, probe response, and optionally to the probe request and association request/response messages. Other than purely informative type–length–values , those IEs will also hold the possible and the currently deployed configuration methods of the device. After this communication of the device capabilities from both ends,

1680-451: The Internet of things (IoT), domain security , videoconferencing , and energy management with products including Webex , OpenDNS , Jabber , Duo Security, Silicon One, and Jasper . Cisco Systems was founded in December 1984 by Leonard Bosack and Sandy Lerner , two Stanford University computer scientists who had been instrumental in connecting computers at Stanford. They pioneered

1750-1002: The OpenFog Consortium , to promote interests and development in fog computing . In January 2016, Cisco invested in VeloCloud, a software-defined WAN (SD-WAN) start-up with a cloud offering for configuring and optimizing branch office networks. Cisco contributed to VeloCloud's $ 27 million Series C round, led by March Capital Partners. In February 2017, Cisco launched a cloud-based secure internet gateway, called Cisco Umbrella, to provide safe internet access to users who do not use their corporate networks or VPNs to connect to remote data centers. Immediately after reporting their fourth-quarter earnings for 2017, Cisco's price-per-share value jumped by over 7%, while its earnings per share ratio increased from 60 to 61 cents per share, due in part to Cisco's outperformance of analyst expectations. In September 2017, Chambers announced that he would step down from

1820-739: The "Silicon One" ASIC chip with the G100 model reaching a speed of 25.6 Tbit/s. The Silicon One competes against the Tomahawk series by Broadcom the Nvidia Spectrum , the Marvell Teralynx and the Intel Tofino. In 2023, the Silicon One G200 will offer a speed of 51.2 Tbit/sec. In March 2020, SVP and GM of Enterprise Networking David Goeckeler left to become CEO of Western Digital . and

1890-582: The 73,400 total employees before curtailment). During the 2011 analyst call, Cisco's CEO John Chambers called out several competitors by name, including Juniper and HP. On July 24, 2012, Cisco received approval from the EU to acquire NDS (a TV software developer) for US$ 5 billion. In 2013, Cisco sold its Linksys home-router unit to Belkin International Inc., signaling a shift to sales to businesses rather than consumers. On July 23, 2013, Cisco Systems announced

1960-447: The E-S1 and E-S2 "secret" nonces . Knowing these two nonces, the PIN can be recovered within a couple of minutes. A tool called pixiewps has been developed and a new version of Reaver has been developed to automate the process. Since both the client and access point (enrollee and registrar, respectively) need to prove they know the PIN to make sure the client is not connecting to a rogue AP,

2030-721: The Internet of Things. The investment fund was allocated to investments in IoT accelerators and startups such as The Alchemist Accelerator , Ayla Networks and EVRYTHNG . Later that year, the company announced it was laying off another 6,000 workers or 8% of its global workforce, as part of a second restructuring. On November 4, 2014, Cisco announced an investment in Stratoscale . On May 4, 2015, Cisco announced CEO and Chairman John Chambers would step down as CEO on July 26, 2015, but remain chairman. Chuck Robbins , senior vice president of worldwide sales & operations and 17-year Cisco veteran,

2100-561: The Reactivity team and product portfolio under its Datacenter Switching and Security Technology Group, which reported to the company's then senior vice president Jayshree Ullal . Throughout the mid-2000s, Cisco also built a significant presence in India, establishing its Globalization Centre East in Bangalore for $ 1 billion. Cisco also expanded into new markets by acquisition—one example being

2170-578: The Rome Call for AI ethics at the Vatican, endorsing the document's principles for responsible and ethical AI use. For the fiscal year 2023, Cisco reported earnings of US$ 12.6 billion, with an annual revenue of US$ 57 billion, an increase of 10.6% over the previous fiscal cycle. Cisco's shares traded at over $ 43 per share, and its market capitalization was valued at US$ 213.2 billion in September 2018. Cisco acquired

Wi-Fi Protected Setup - Misplaced Pages Continue

2240-453: The SSID or band (e.g., 2.4/5 GHz) explicitly selected by the user on the client for connection with WPS (e.g. pushing the 5 GHz, where supported, WPS button on the wireless router will force a client device to connect via WPS on only the 5 GHz band after a WPS session has been established by the client device which cannot explicitly allow the selection of wireless network and/or band for

2310-550: The US-based company best known for its cloud-based contract management platform ServiceExchange. On the same month, Cisco acquired Pawaa, a privately held company in Bangalore, India that provides secure on-premises and cloud-based file-sharing software. On September 30, 2015, Cisco announced its intent to acquire privately held Portcullis Computer Security, a UK-based company that provides cybersecurity services to enterprise clients and

2380-421: The WPS PIN feature, although this may not be possible on some router models. The standard emphasizes usability and security , and allows four modes in a home network for adding a new device to the network: The last two modes are usually referred to as out-of-band methods as there is a transfer of information by a channel other than the Wi-Fi channel itself. Only the first two modes are currently covered by

2450-450: The WPS button on the home router. A major security flaw was revealed in December 2011 that affects wireless routers with the WPS PIN feature, which most recent models have enabled by default. The flaw allows a remote attacker to recover the WPS PIN in a few hours with a brute-force attack and, with the WPS PIN, the network's WPA/WPA2 pre-shared key (PSK). Users have been urged to turn off

2520-453: The WPS certification. The USB method has been deprecated and is not part of the Alliance's certification testing. Some wireless access points have a dual-function WPS button, and holding this button down for a shorter or longer time may have other functions, such as factory-reset or toggling WiFi. Some manufacturers, such as Netgear , use a different logo and/or name for Wi-Fi Protected Setup;

2590-399: The WPS connection method). In December 2011, researcher Stefan Viehböck reported a design and implementation flaw that makes brute-force attacks against PIN-based WPS feasible to be performed on WPS-enabled Wi-Fi networks. A successful attack on WPS allows unauthorized parties to gain access to the network, and the only effective workaround is to disable WPS. The vulnerability centers around

2660-634: The Wi-Fi Alliance recommends the use of the Wi-Fi Protected Setup Identifier Mark on the hardware button for this function. The WPS protocol defines three types of devices in a network: The WPS standard defines three basic scenarios that involve components listed above: The WPS protocol consists of a series of EAP message exchanges that are triggered by a user action, relying on an exchange of descriptive information that should precede that user's action. The descriptive information

2730-411: The acknowledgement messages sent between the registrar and enrollee when attempting to validate a PIN, which is an eight-digit number used to add new WPA enrollees to the network. Since the last digit is a checksum of the previous digits, there are seven unknown digits in each PIN, yielding 10 = 10,000,000 possible combinations. When an enrollee attempts to gain access using a PIN, the registrar reports

2800-588: The acquisition of ThreatGRID, a company that provided dynamic malware analysis and threat intelligence technology. On June 17, 2014, Cisco announced its intent to acquire privately held Tail-f Systems, a leader in configuration management software. On April 2, 2015, Cisco announced plans to buy Embrane, a software-defined networking startup. The deal will give Cisco Embrane's software platform, which provides layer 3–7 network services for things such as firewalls, VPN termination, server load balancers and SSL offload. On May 7, 2015, Cisco announced plans to buy Tropo,

2870-399: The attacker already has two hashes that contain each half of the PIN, and all they need is to brute-force the actual PIN. The access point sends two hashes, E-Hash1 and E-Hash2, to the client, proving that it also knows the PIN. E-Hash1 and E-Hash2 are hashes of (E-S1 | PSK1 | PKe | PKr) and (E-S2 | PSK2 | PKe | PKr), respectively. The hashing function is HMAC-SHA-256 and uses the "authkey" that

Wi-Fi Protected Setup - Misplaced Pages Continue

2940-531: The company's product lines. Limits of IOS and aging Crescendo architecture also forced Cisco to look at merchant silicon in the carrier Ethernet segment. This resulted in a new ASR 9000 product family intended to consolidate the company's carrier Ethernet and subscriber management business around EZChip -based hardware and IOS-XR . In March 2007, Cisco acquired Reactivity Inc, a privately held XML gateway provider based in Redwood City, California . Cisco placed

3010-479: The concept of a local area network (LAN) being used to connect distant computers over a multiprotocol router system . The company went public in 1990 and, by the end of the dot-com bubble in the year 2000, had a market capitalization of $ 500 billion, surpassing Microsoft as the world's most valuable company. Cisco stock (CSCO) was added to the Dow Jones Industrial Average on June 8, 2009, and

3080-402: The early 1980s students and staff at Stanford, including Bosack, used technology on the campus to link all of the school's computer systems to talk to one another, creating a box that functioned as a multiprotocol router called the "Blue Box". The Blue Box used circuitry made by Andy Bechtolsheim , and software that was originally written at Stanford by research engineer William Yeager . Due to

3150-467: The executive chairman role at the end of his term on the board in December 2017. On December 11, 2017, Robbins was elected to succeed Chambers as executive chairman while retaining his role as CEO, and Chambers was given the title of "Chairman Emeritus". Reuters reported that "Cisco Systems Inc's (CSCO.O) product revenue in Russia grew 20 percent in 2017, ahead of Cisco's technology product revenue growth in

3220-493: The government sectors. On October 26, 2015, Cisco announced its intent to acquire ParStream, a privately held company based in Cologne, Germany, that provides an analytics database that allows companies to analyze large amounts of data and store it in near real-time anywhere in the network. On October 27, 2015, Cisco announced that it would acquire Lancope , a company that focuses on detecting threat activity, for $ 452.5 million in

3290-686: The impossibility of re-exporting. In February 2023, Cisco also wrote off the debt of the Russian mobile operator MTS in the amount of 1.234 billion rubles. As expected, these are unpaid amounts for previous equipment deliveries. In 2023, Cisco announced plans to begin manufacturing equipment in India. On 15 February 2024, Cisco announced it would lay off more than 4,000 employees, or 5% of its global workforce, and lowered its annual revenue forecast due to economic challenges and reduced demand from telecom and cable service providers. On 24 April 2024, Chuck Robbins, CEO of Cisco, met with Pope Francis and signed

3360-404: The mid-to-late 1990s. Cisco introduced products ranging from modem access shelves (AS5200) to core GSR routers, making them a major player in the market. In late March 2000, at the height of the dot-com bubble , Cisco became the most valuable company in the world, with a market capitalization of more than $ 500 billion. As of July 2014, with a market cap of about US$ 129 billion, it

3430-557: The migration to new high-end hardware CRS-1 and software architecture IOS XR . As part of a rebranding campaign in 2006, Cisco Systems adopted the shortened name "Cisco" and created "The Human Network" advertising campaign. These efforts were meant to make Cisco a "household" brand—a strategy designed to support the low-end Linksys products and future consumer products. On the more traditional business side, Cisco continued to develop its routing, switching and security portfolio. The quickly growing importance of Ethernet also influenced

3500-596: The most expensive acquisition made by Cisco to that date, and only the acquisition of Scientific Atlanta has been larger. In 1999, Cisco also acquired a stake for $ 1 billion in KPMG Consulting to enable establishing Internet firm Metrius founded by Keyur Patel of Fuse. Several acquired companies have grown into $ 1Bn+ business units for Cisco, including LAN switching, Enterprise Voice over Internet Protocol (VOIP) platform Webex and home networking . The latter came as result of Cisco acquiring Linksys in 2003 and in 2010

3570-688: The only remedy is to get a firmware update to enable the PIN to be changed, or to replace the wireless access point. It is possible to extract a wireless passphrase with the following methods using no special tools: Cisco Cisco Systems, Inc. (using the trademark Cisco ) is an American multinational digital communications technology conglomerate corporation headquartered in San Jose, California . Cisco develops, manufactures, and sells networking hardware , software , telecommunications equipment and other high-technology services and products. Cisco specializes in specific tech markets, such as

SECTION 50

#1732854527977

3640-435: The original data to be recovered in certain cases. The simplest checksum algorithm is the so-called longitudinal parity check , which breaks the data into "words" with a fixed number n of bits, and then computes the bitwise exclusive or (XOR) of all those words. The result is appended to the message as an extra word. In simpler terms, for n =1 this means adding a bit to the end of the data bits to guarantee that there

3710-457: The other so-called BRIC countries of Brazil , China and India ." On May 1, 2018, Cisco Systems agreed to buy AI-driven business intelligence startup Accompany for $ 270 million. As of June 2018, Cisco Systems ranked 444th on Forbes Global 2000 list, with $ 221.3 billion market cap. In 2019, Cisco acquired CloudCherry, a customer experience management company, and Voicea, an artificial intelligence company. In 2019, Cisco also introduced

3780-418: The same position in two distinct words. Also swapping of two or more words will not be detected. If the affected bits are independently chosen at random, the probability of a two-bit error being undetected is 1/ n . A variant of the previous algorithm is to add all the "words" as unsigned binary numbers, discarding any overflow bits, and append the two's complement of the total as the checksum. To validate

3850-594: The start of a string can provide a hash appropriate for some applications but will never be a suitable checksum. Checksums are used as cryptographic primitives in larger authentication algorithms. For cryptographic systems with these two specific design goals , see HMAC . Check digits and parity bits are special cases of checksums, appropriate for small blocks of data (such as Social Security numbers , bank account numbers, computer words , single bytes , etc.). Some error-correcting codes are based on special checksums which not only detect common errors but also allow

3920-407: The stored value of a previously computed checksum, there is a very high probability the data has not been accidentally altered or corrupted. Checksum functions are related to hash functions , fingerprints , randomization functions , and cryptographic hash functions . However, each of those concepts has different applications and therefore different design goals. For instance, a function returning

3990-435: The time, the company envisioned layer 3 routing and layer 2 ( Ethernet , Token Ring ) switching as complementary functions of different intelligence and architecture—the former was slow and complex, the latter was fast but simple. This philosophy dominated the company's product lines throughout the 1990s. In 1995, John Morgridge was succeeded by John T. Chambers . The Internet Protocol (IP) became widely adopted in

4060-545: The underlying architecture, and its ability to scale well, Yeager's well-designed invention became a key to Cisco's early success. In 1985, Bosack and Stanford employee Kirk Lougheed began a project to formally network Stanford's campus. They adapted Yeager's software into what became the foundation for Cisco IOS , despite Yeager's claims that he had been denied permission to sell the Blue Box commercially. On July 11, 1986, Bosack and Lougheed were forced to resign from Stanford and

4130-417: The university contemplated filing criminal complaints against Cisco and its founders for the theft of its software, hardware designs, and other intellectual properties. In 1987, Stanford licensed the router software and two computer boards to Cisco. In addition to Bosack, Lerner, Lougheed, Greg Satz (a programmer), and Richard Troiano (who handled sales), completed the early Cisco team. The company's first CEO

4200-429: The user initiates the actual protocol session. The session consists of eight messages that are followed, in the case of a successful session, by a message to indicate that the protocol is completed. The exact stream of messages may change when configuring different kinds of devices (AP or STA), or when using different physical media (wired or wireless). Some devices with dual-band wireless network connectivity do not allow

4270-414: The user to select the 2.4 GHz or 5 GHz band (or even a particular radio or SSID) when using Wi-Fi Protected Setup, unless the wireless access point has separate WPS button for each band or radio; however, a number of later wireless routers with multiple frequency bands and/or radios allow the establishment of a WPS session for a specific band and/or radio for connection with clients which cannot have

SECTION 60

#1732854527977

4340-499: The validity of the first and second halves of the PIN separately. Since the first half of the pin consists of four digits (10,000 possibilities) and the second half has only three active digits (1000 possibilities), at most 11,000 guesses are needed before the PIN is recovered. This is a reduction by three orders of magnitude from the number of PINs that would be required to be tested. As a result, an attack can be completed in under four hours. The ease or difficulty of exploiting this flaw

4410-416: The value of each word but also its position in the sequence. This feature generally increases the cost of computing the checksum. The idea of fuzzy checksum was developed for detection of email spam by building up cooperative databases from multiple ISPs of email suspected to be spam. The content of such spam may often vary in its details, which would render normal checksumming ineffective. By contrast,

4480-428: The vulnerability since early 2011 and had been using it. In some devices, disabling WPS in the user interface does not result in the feature actually being disabled, and the device remains vulnerable to this attack. Firmware updates have been released for some of these devices allowing WPS to be disabled completely. Vendors could also patch the vulnerability by adding a lock-down period if the Wi-Fi access point detects

4550-463: Was Bill Graves, who held the position from 1987 to 1988. In 1988, John Morgridge was appointed CEO. The name "Cisco" was derived from the city name San Francisco , which is why the company's engineers insisted on using the lower case "cisco" in its early years. The logo is intended to depict the two towers of the Golden Gate Bridge . On February 16, 1990, Cisco Systems went public with

4620-649: Was announced as the next CEO. On July 23, 2015, Cisco announced the divestiture of its television set-top-box and cable modem business to Technicolor SA for $ 600 million, a division originally formed by Cisco's $ 6.9 billion purchase of Scientific Atlanta . The deal came as part of Cisco's gradual exit from the consumer market, and as part of an effort by Cisco's new leadership to focus on cloud-based products in enterprise segments. Cisco indicated that it would still collaborate with Technicolor on video products. On November 19, 2015, Cisco, alongside ARM Holdings , Dell , Intel , Microsoft and Princeton University , founded

4690-534: Was integrated into the Cisco Security business unit. Ironport's Senderbase was renamed as Sensorbase to take account of the input into this database that other Cisco devices provide. SensorBase allows these devices to build a risk profile on IP addresses, therefore allowing risk profiles to be dynamically created on http sites and SMTP email sources. In 2010, Cisco bought Starent Networks (a mobile packet core company) for $ 2.9 billion and Moto Development Group,

4760-617: Was replaced by Todd Nightingale, head of Cisco Meraki . In October 2022, Cisco announced a partnership adding the Microsoft Teams app to its meeting devices. In 2022, Cisco completely curtailed sales of its equipment in Russia due to Russian invasion of Ukraine , and completely discontinued service for already-sold devices. In April 2023, it became known that the company had destroyed equipment, spare parts, and even vehicles and office furniture worth 1.86 billion rubles (about $ 23 million) due to

4830-576: Was still one of the most valuable companies. The perceived complexity of programming routing functions in silicon led to the formation of several startups determined to find new ways to process IP and MPLS packets entirely in hardware and blur boundaries between routing and switching. One of them, Juniper Networks , shipped their first product in 1999 and by 2000 chipped away about 30% from Cisco SP Market share. In response, Cisco later developed homegrown ASICs and fast processing cards for GSR routers and Catalyst 6500 switches. In 2004, Cisco also started

4900-509: Was supplemented with new product line dubbed Cisco Valet . Cisco announced on January 12, 2005, that it would acquire Airespace for US$ 450 million to reinforce the wireless controller product lines. Cisco announced on January 4, 2007, that it would buy IronPort in a deal valued at US$ 830 million and completed the acquisition on June 25, 2007. IronPort was best known for its IronPort AntiSpam, its SenderBase email reputation service and its email security appliances. Accordingly, IronPort

#976023