Cisco Blogs


Cisco Blog > Government

New Edge Devices are Having a Cascade Effect on Public Sector IT Consumption

Multiple changes are on the horizon for public sector information technology managers. Over the next two years, IT organizations could be heavily impacted by these transformations, via a very distinct series of events.  Government and education CIOs, program managers, and business process planners will need to keep an eye on these looming changes as they embark on long-range IT plans.

IDC Government Insights recently worked with Cisco to develop a detailed InfoBrief –  as a way of highlighting these crucial issues. It’s titled Public Sector Reacts Positively to the Changes in IT Consumption.

Read More »

Tags: , , , , , , ,

The Risk of Remote Connection: What’s Your Plan?

July 17, 2014 at 6:00 am PST

As a business or technical leader, you know you need to protect your company in a rapidly evolving mobile ecosystem. However, threats are not always obvious. As malware and attacks become more sophisticated over time, business decision makers must work with technical decision makers to navigate security threats in a mobile world.

This blog series, authored by Kathy Trahan, will explore the topic of enterprise mobility security from a situational level and provide insight into what leaders can do now to mitigate risk. To read the first post focused on securing device freedom, click here. – Bret Hartman, Chief Technology Officer (CTO) for Cisco’s Security Technology Group

Imagine two of your executives are using a SaaS platform while working off an unsecure hotel Wi-Fi network nearby. Did you know that SaaS and B2B applications are 15 times more likely than pornography to deliver malicious content across a network?

The threats against a remote connection are unfortunately very real and using an unprotected network to access company assets (whether on-premise or in the cloud) can have serious consequences.

As the growth of mobility and cloud blur the lines of our personal and business lives, the “mobile cloud” has drawn users (consumer or employee) to its convenience. According to a recent Gallup poll, nearly 80% of workers had positive feelings for using their own computers and mobile devices to stay connected to work outside of normal business hours.

For IT, the mobile cloud offers huge management efficiencies. Recent Cisco mobility research confirms that mobility strategies are converging with cloud strategies. However, it also forces IT and business leaders to find a happy medium between encouraging corporate productivity and addressing a new wave of security concerns. From the same research, nearly half of the organizational leaders surveyed say security risks can prevent them from moving forward with mobility initiatives.

Despite these risks, It is hard to dispute that off premise access provides significant productivity gains especially as organizations see mobility as a competitive edge to embrace.

As more mobile users enter the market, (over half a billion devices were added just last year) and the number of remote workers becomes more ubiquitous, the expectation is that networks and access should be the same, regardless of location.

Read More »

Tags: , , , ,

Securing Your Network Before BYOD or IoT

If you’re a network engineer or have been following some of the recent trends in network security space, you may have come across terms such as “erosion of trust”, “zero trust ecosystem”, “the increased attack surface” and “new attack vectors”. What this means for a network engineer is that as application migrate from on-prem to cloud, and trends like mobility and IoT vastly expand the scale of assets and forms of access to be secured, traditional network security, which historically was centered around securing the perimeter of your network, is no longer sufficient.

Anatomy of Data Breach

I was recently reading the Symantec Internet Security Report. This report has been quite appropriately themed as “2013: Year of the Mega-Breach”. In particular, the Point-of-Sale type of attack, mostly prevalent in the retail segment of the market, is a great indicator of the anatomy of a typical breach. So I’ll use that as an illustrative example for the purposes of this post.

Read More »

Tags: , , , , ,

FlexPod, Based on UCS Integrated Infrastructure, is a Leader in Integrated Infrastructure

July 16, 2014 at 1:01 pm PST

The month of June was very exciting for FlexPod.  On June 16th, Gartner released their 2014 Magic Quadrant for integrated infrastructure with FlexPod positioned in the leaders quadrant. On June 25th, Cisco and NetApp FlexPodannounced FlexPod has generated $3 billion in joint sales since its launch in 2010 with more than 4100 customers. The very next day, IDC released its Worldwide Integrated Infrastructure & Platforms Tracker for Q1 2014 with FlexPod ranked number one in factory revenue.

The integrated infrastructure segment continues to be one of the fastest growing IT markets. IDC has this segment growing at a staggering 69 percent per year. Cisco is a core vendor in the integrated infrastructure market with leading integrated systems built on top of UCS integrated infrastructure (Cisco UCS, Cisco Nexus, and UCS Director). According to the latest IDC tracker, UCS integrated infrastructure participates in the top three integrated Infrastructures.

Cisco and NetApp plan to integrate innovative technologies into the FlexPod architecture, including Cisco Application Centric Infrastructure (ACI) and Intercloud Fabric, along with NetApp’s clustered DATA ONTAP and Flash technologies. We are proud of our achievements and thankful for our customers in helping us achieve this success.

#InnovateThink Tweet Chat on Friday, July 18 at 10 a.m. PST: Fast IT: An IT Model for the #InternetOfEverything

As the Internet of Everything (IoE) continues to drive one of the most sweeping market transitions in history, organizations will need to be hyper-aware, predictive, and agile. And IT will demand an infrastructure that is flexible enough to keep pace with rapid change and fast innovation, as it responds dynamically to ever-rising threat levels. Above all, it must support business leaders looking to capture their share of the $19 trillion in IoE-related value at stake.

But a rethink on the traditional role of IT is critical. Today, IT cannot simply continue “keeping the lights on.” More than ever, IT must partner with the business as an orchestrator of services and a true leader in innovation. The new IT operating model for the IoE era is Fast IT. And it enables more efficient processes, better asset utilization, an increasingly productive employee base, and improved customer experiences.

Fast IT is the way forward for businesses looking to compete and thrive in the rapidly changing IoE economy. Is your organization ready for the transformation?

Here are a few questions to consider as you evaluate your organization’s readiness:

  • How confident are you in your current network’s ability to propel your business into the future?
  • What are your top three concerns about your network?
  • What are the criteria you see as crucial for your organization to adopt a Fast IT model?
  • How will next-gen networking affect your IT staff, role and influence?

7 14 Cisco_IDG_Twitter v2

Join me on Twitter this Friday, July 18 at 10 a.m. PST/1 p.m. EST for insights and feedback about the #FutureOfIT, the #InternetofEverything and your organization in the #InnovateThink Tweet Chat.

Follow @JosephMBradley to learn more about the Internet of Everything and how companies must embrace Fast IT to fully maximize the value of the Internet of Everything for both themselves and their customers. Join the discussion by simply using hashtags #InnovateThink and #FutureOfIT on Twitter to join the conversation.

Learn more about the role of Fast IT in an Internet of Everything world:

Tags: , , , , , , , , ,