Cisco Online Seminar - Cisco Systems

Protect Yourself Against Security Challenges with Next-Generation Encryption

Learn about NGE, and how the Cisco NGE portfolio can help address Security challenges.

(Original Workshop on Wednesday September 12, 2012)

NGE offers the best technologies for cutting edge cryptography, and it is setting the industry trend. These are the best standards that one can implement today to meet the security and scalability requirements 10 years hence or to interoperate with the cryptography that will be deployed in that time frame.

The algorithms that comprise NGE are the result of more than 30 years of global advancement and evolution in cryptography. Each constituent component of NGE has its own history, depicting the diverse history of the NGE algorithms as well as their long-standing academic and community review In the end, NGE is composed of globally created, globally reviewed, and publicly available algorithms.

The U.S. National Security Agency (NSA) has also identified a set of cryptographic algorithms that, when used together, are the preferred method for ensuring the security and integrity of information passed over public networks such as the Internet. The NSA calls the set of algorithms Suite B. The algorithms in Suite B are the same algorithms used in NGE. Additionally, because they are integrated into IETF standards, NGE algorithms make it easier to collaborate in environments where costs or logistics traditionally hindered information sharing.

Join experts from Cisco to learn about NGE, and how the Cisco NGE portfolio can help address Security challenges. An overview of Cisco NGE will be presented.


Approximate duration: 60 minutes

Need Help? Report problems or request assistance: Help Desk.

Cisco only privacy policy: You are being invited to attend a Cisco-sponsored event. By providing your contact details, a representative may contact you regarding this event. All personal information will be handled in accordance with Cisco's privacy notice.

Event Summary

  • Event type: Online Event
  • On Demand
  • Duration: 60 minutes

Who Should Attend

IT level managers and technical decision makers with an interest in managing and end-to-end network that includes an influx of mobile devices.

  • Government
  • Health Care
  • Education
  • Large Corporations
  • Press/Analyst
  • Service Provider
  • Channels
  • Small / Medium Business
  • Finance