Cisco Blogs


Cisco Blog > SP360: Service Provider

A Practical Path to Gigabit Services Over Cable

By John Mattson, Senior Director of Marketing, Cisco Cable Access Business Unit

By now you’ve heard from AT&T, Google Fiber, Verizon, and the mainstream media, about their plans to offer Gigabit services in over14 states that’ll get wired for 1 Gig next year. Will Gigabit become a “New Norm”?

And if you’re a broadband service provider, you’re thinking, “okay, so, my fastest tiers are my lowest subscribed – tell me again why I need to rush to get this done right now?”

Far be it from me, or us, to pile on to this particular viewpoint, when it comes to Gigabit DOCSIS. Naturally, we see a reason for it. We sell the equipment. But I do think there’s a more plausible way to look at it, which is timely, because it’s a technical discussion, and this is the week of the Society of Cable Telecommunications Engineers’ annual Cable-Tec Expo in Atlanta.

We propose the following question to our cable operator customers: What if there was a way to profitably offer very high-speed services in your upper service tiers, while increasing speeds in your lower tiers, without massive disruption and the dreaded “forklift upgrade”? We believe there is. Think about it: Read More »

Tags: , , ,

Check out the Cisco Security Blog

My posts will be focused on bringing topics of interest to government and business decision makers and explaining topics that could be very technical at level to allow good business decisions.  As a company, Cisco is blessed with some very smart and technical people who can go into much greater depth than I would even attempt.  We also have many more prolific bloggers than me.  If you would like more information and for good reading on Cybersecurity topics, I recommend you take a look at the Cisco Security Blog – especially this month.  Since October is National Cyber Security Awareness Month, they are posting a blog every day on cyber topics.  Check it out!

Security Is Pervasive in the Cisco Blog Community

October 21, 2013 at 9:00 am PST

As we pass the halfway point of National Cyber Security Awareness Month (NCSAM), I wanted to call attention to some of our colleagues over on the Cisco Government Blog. Patrick Finn and Peter Romness have been busy this month espousing the need for security and we thought it would be beneficial to expose our readers to their thoughts on security that have been published on the Cisco Government Blog space. Read More »

Tags: , , ,

Defensive Security: The 95/5 Approach

Many organizations make the error of thinking that basic defensive software is sufficient to protect critical data and infrastructure. When in reality, in order for government and enterprise organizations to keep their data protected from increasingly advanced cyber threats, comprehensive defensive security approaches are critical. And even with advanced, comprehensive solutions, there are still risks.

No organization is ever going to be able to protect 100 percent of its assets 100 percent of the time, which is why I work on the 95/5 principle. No matter how many security solutions are deployed, if attackers are determined enough, they will find a hole. Humans make mistakes and without fail, attackers will take advantage of them.

With comprehensive security approaches, we can regularly block at least 95 percent of threats—but there is always going to be a margin of error—the other 5 percent. A proactive, continuous approach can help ensure the vast majority of offensive moves are rejected.

Read More »

Tags: , , ,

Mobile Devices Will Transform Your Business IT

There’s no question that more people around the world are connecting to wireless networks at home, work and play via mobile devices, such as smartphones and tablets. This rise in mobile device usage begs the question: How soon will it be (if not already) before these mobile devices dominate the mobile network, especially in the workplace?

Chris Spain - with header FINALJust recently, I read an article in Forbes, by Louis Columbus, that addresses the issue of increased mobile devices and unprepared network infrastructures. The article examines a study by IDC that predicts that 87% of sales for connected devices will be tablets and smartphones in next four years. As many employees prefer working from their own mobile devices, corporate networks, as they’re currently designed, will not be capable of successfully managing such a large volume of mobile data traffic generated by these mobile devices. With such expansive growth expected, the majority of businesses will either need to adapt an existing strategy to support this increase in mobile devices or adopt a new strategy.

Currently, there is a clear need for enterprises to better prepare and invest in their IT infrastructure. As more employees use their own devices at work for business and personal use, it’s imperative that business organizations require a secure mobile device and BYOD strategy to accommodate their business needs and employee preferences. However, the decision to adopt BYOD comes with a set of challenges for IT organizations.

Many of the benefits of BYOD, such as having the choice of device and anywhere, anytime access, are somewhat adverse to traditional IT requirements for security and support. In the past, IT pre-determined a list of approved workplace devices, typically a prescribed desktop, laptop, and perhaps even a small, standardized set of mobile phones and smartphones. Employees could choose among these devices, but generally were not permitted to stray from the approved devices list. With BYOD, IT has to approach the problem differently. Read More »

Tags: , , , , , , , , , , , ,