Cisco Blogs


Cisco Blog > CiscoHome

Top Reasons Why Using Webinars is Good for Business

March 21, 2012 at 8:52 am PST

You have expertise and that can be a powerful differentiator for you in business.

Use a webinar to share your knowledge, attract new people and even help hone your internal processes. Here are five reasons why using webinars (and WebEx) is good for business.

1. Add value to your brand.

Leverage your in-house expertise using it to distinguish your business leadership. A good webinar parallels all of the information your company is already putting out, but adds depth to a particular area. It also can allow users to ask specific questions. Here’s how Mike Bartkus at SkillSurvey uses webinars to tell people how to avoid bad hires. While you learn new information, you tacitly trust Mike’s advice and expertise.

2. Educate and inform your audience; share your passion.

Seeing is believing. If you have a great widget, show me how it works and what it can do for me and my company. Engage me. Don’t bore me with a slide-show about your company’s history. Show me what your product or services can do and why I can’t live without them.

3. Fill the funnel.

Generate marketing leads with a successful webinar. You’ll attract those people who are most interested in the subject matter which should shorten your sales cycle. The potential audience here is unfettered by time or location, and bonus, the webinar lacks the associated travel costs of a large marketing event. It’s win-win.

4. Create a lasting impression.

“Whatever webinar you’re doing, it’s worth recording it,” says Brian Carroll, CEO of InTouch Inc. “We’ve been able to show that 300% to 500% more people watch a recorded webinar than attend a live one,” Carroll said. “If you don’t record it, you’re missing out on more than half of your audience.” Creating an asset that can be used repeatedly over time can save you money and time.

5. Move your business forward.

Webinars can help you train your employees on a new piece of software from your home office, saving you time and travel costs. You can provide employees with everything they need all at the same time, with hyperlinks, and if you record the webinar, employees can refer back to it at a later time if they need a refresher or feel that they missed something the first go round.

Read More »

Tags: , , , , ,

Protect Data Shared Through Unified Communications

Lock down your UC system to prevent the theft or loss of sensitive business information

Companies large and small have embraced VoIP (voice over IP) and unified communications (UC), and malicious parties are there, too. In fact, some research firms estimate that targeted attacks on VoIP infrastructure account for as much as one third of all attacks around the world, in part because companies haven’t secured their VoIP and UC systems as well as other online applications like email. Unauthorized persons can use holes in UC systems to sneak onto your network, access stored business data like sensitive customer information, or commit toll fraud.

Read More »

Tags: , , , ,

Moving Beyond BYOD: Connecting the ‘Anytime, Anywhere’ Workforce

With more than seven billion souls set to tote 10 billion mobile-connected devices by 2016, mobility has not just arrived, it’s taken over our schools, businesses and personal lives.

Just ask Mitch Davis, the CIO of Bowdoin College, a private liberal arts college in Maine. Before BYOD ever became a global IT trend, according to Mitch, the vast majority of college students were already bringing their personal devices into the campus environment.

These co-eds expected Bowdoin to fully embrace personal mobility, and, upon graduation, these same post-grads expect that their employers will do the same (this year’s Connected World Technology Report findings back this up, with more than 40 percent of recent college graduates/Gen Y employees choosing BYOD flexibility over higher pay).

Bottom line, the rules of the game are changing, and companies must move beyond basic BYOD connectivity to meet employee demands today and tomorrow. To help companies meet these demands, we’ve introduced a comprehensive approach that unifies policy, supports a better user experience and simplifies management to deliver an uncompromised user experience in any workspace. After all, Cisco wants to empower IT managers to allow employees to have their devices and use them too. That means delivering:

  1. A unified security policy across the whole organization – wired, wireless, VPN and now MDM – helping companies set and enforce policies;
  2. An uncompromised user experience over the entire wired/wireless network, across any type of device; and,
  3. Simplified operations and network management to understand application performance from a user’s perspective, accelerating troubleshooting and lowering operating costs.

Like Ray-Ban aviators, BYOD is here to stay. And done the right way, BYOD demands a comprehensive approach to allow current and future employees to work how they want, when and where they want, and on the devices they want – while still allowing IT the control and visibility to sleep at night.

Learn more about our announcement and new technologies here.

By the way, whether you’re a college student or have been working for 30 years, you’re eligible to take the BYOD Challenge and win a trip to 2012 London Olympics – good luck!

Tags: , , , , , , , , , , , , , , , ,

Digital Promise Team Pushes Aggressive Agenda For Learning

Back in January, U.S. Department of Education Secretary Arne Duncan and Federal Communications Commission Chairman Julius Genachowski challenged schools and companies to get digital textbooks in students’ hands by the year 2017. Prompted by countries like South Korea and Uruguay -- which have made similar moves – the Obama administration is seeking to create momentum on this key topic.

Adam Frankel Opens the League Meeting at Houston ISD

Yet when we look around us, most educators and superintendents in the U.S. are left scratching our collective heads as we witness our glacial progress toward fully deployed digital nationwide learning. Lack of data on “what works”, lack of best practices in district-level leadership, and a splintered procurement process are often cited as three major roadblocks to progress. As mentioned in earlier blogs here, Digital Promise’s newly formed “League of Innovative Schools” is hoping to change all that.

Read More »

Tags: , , , ,

Cisco’s Global WSA deployment – Update

This is an update to the original video/blog post Cisco Ironport Web Security Appliance Deployment on the Cisco Security Incident Response Team (CSIRT) deployment of the Web Security Appliance.

We have completed the global deployment at Cisco and wanted to share some experiences and feedback via the following video:

Tags: , , , ,