Cisco Blogs


Cisco Blog > Data Center and Cloud

Straight Talk About Cloud: 20 Providers and What They Think You Want

There’s a lot of talk about cloud, and for good reason.  According to a new white paper from IDC, 68% of companies with more than 1,000 employees are using some form of cloud or plan to implement cloud within the next 12 months.  In addition, these companies adopting cloud expect to spend 54% of their IT budgets on cloud in two years.

For the white paper, IDC contacted 20 providers from among the more than 200 cloud providers offering Cisco Powered services.  What makes the white paper unique is that these providers were asked to share their perspective on how their customers perceive value.  These are the companies who are investing substantial resources into building out their infrastructure to be able to offer your organization cloud services as you need them.  They make their investments based on what they believe are your primary needs and key concerns.

Specifically, the white paper explores which perceived factors are the most important to cloud providers in reaching you, their customer.  It also reveals how these providers seek to differentiate themselves and where they see the best value in their cloud infrastructure investments.

You can watch the video and read the full IDC white paper for yourself.  The white paper was also reported on by Computerworld.

Tags: , , ,

Partner Voices: TekLinks Provides Cloud-Delivered EHR

August 13, 2014 at 7:30 am PST

As we continue to expand the Partner Voices series, I get the opportunity to talk to more and more of our partners, which I love. I also get the inside scoop on some innovative solutions entering the marketplace. Just recently, I spoke with David Powell, Vice President of Cloud and Managed Services at TekLinks about their cloud-delivered electronic health record (EHR) applications.

David answered some questions I had about how TekLinks can provide doctors and their staff with a fully HIPAA-compliant data as a service DaaS solution. Of course, the TekLinks’ solution is Cisco-certified, which is why we are so interested in seeing how they implemented the solution as a stand-alone hosted app, or as a complete virtual desktop for any number of end users.

Frankly, there are times when David talks and I simply can’t follow, unless it’s around our shared tastes in music, or the few times that we might agree on a finer point of college football. In this case however, it all sounds so simple when David explains the importance and relevance of the TekLinks solution, so it’s easier if I just let him speak for himself. Read More »

Tags: , , , , , ,

The Internet of Everything Is the New Economy

We have only seen a glimpse of what Internet of Everything (IoE) has in store for the planet. The change is much bigger than technology alone. The new IoE economy will profoundly affect people, things, data, and processes.

Find out more in this short video, based on my article, The Internet of Everything Is the New Economy Read More »

Tags: , , , , , , , , , , , ,

Putting a Damper on ‘Lateral Movement’ due to Cyber-Intrusion

Analysis of high-profile cyber breaches often reveals how intruders gain their initial footprint in the targeted organizations and bypass perimeter defenses to establish a backdoor for persistent activities. Such stealthy activities may continue until intruders complete their ultimate mission—claiming the “crown jewels” of the victim organization.

“Lateral movement” is a term increasingly used to describe penetration activities by intruders (more information on lateral movement is available in Verizon’s 2014 Data Breach Investigations Report[1]). These activities begin with network reconnaissance, typically leading to compromises, hijacking of user accounts and ultimately privilege escalation to access sensitive data. Organizations may go to great lengths to detecting and stopping the initial breach and final data exfiltration as well as establishing more intelligence at their ingress/egress perimeters. But how can you minimize the damage caused by an intruder’s lateral movement once your network is already compromised?

Read More »

Tags: , , ,

IWAN Wed: Three reasons why you should consider Cisco WAAS

Screen Shot 2014-08-12 at 4.47.02 PMThere are a billion reasons (okay, I may be exaggerating but you get my point) why you should choose Cisco WAAS as THE WAN optimization solution for your company.  But today, I want to emphasize the following three:

#1. Not your ordinary WAN optimization

With Cisco WAAS, you’re not just getting WAN optimization but much more.  WAAS is integrated into the industry leading branch routers – the ISRs – and this means the capabilities are not only limited to WAN optimization and application acceleration but to security, application visibility, QoS and much more.  The Cisco Intelligent WAN is an entire package along with WAAS to provide an uncompromised user experience over any connection.  Regardless of the type of connection that particular branch has, WAAS can reduce bandwidth usage and accelerate applications working alongside with Intelligent Path Control, Transport Independence, and Security.

Read More »

Tags: , , , , , ,