Cisco Blogs


Cisco Blog > Enterprise Networks

Network Certified Engineers: Evolving with Confidence

Network Certified Engineer

Network Certified Engineer

Customers reach out to Cisco Services because they have confidence in our skills and abilities. One way we build that confidence for our customers—and for ourselves—is through certifications and specialization.

  • As we study for certifications, we gain confidence in our understanding and abilities to execute in our areas of study.
  • As we test our knowledge against known standards, we prove competency, which also improves our self-confidence.

As the networking industry evolves, the role of the Network Certified Engineer (NCE) also must evolve. Gone are the days of configuring and managing a large-scale network via command-line interface. Read More »

Tags: , , , , ,

Hybrid WAN Requires Advanced Network Services

A few weeks back, Gartner analyst Bjarne Munch stated, “Internet and MPLS play an equally important role for enterprise connectivity. Network planners must establish a unified WAN with strong integration between these two networks to avoid performance problems.”[i]

So, why should IT move to a hybrid WAN architecture? What are the benefits?

#1 – Control Costs

Growth in bandwidth demand is overwhelming customer networks, particularly at the branch. IP traffic is expected to grow three times over the next five years due to video, cloud applications, rich media and data center centralization. At the same time, Nemertes’ 2014 WAN Best Practices and Success Factors report states that 60% of IT WAN budgets will remain flat or decline in 2015. Read More »

Tags: , , , , , , , ,

ITD – Intelligent Traffic Director (Part 2)

Cisco® Intelligent Traffic Director (ITD) is an innovative solution to bridge the performance gap between a multi-terabit switch and gigabit servers and appliances. ITD is much superior than legacy solutions such as PBR, ECMP, Port-channel, etc for service appliances and servers.  ITD is allowing customers to achieve massive CAPEX and OPEX savings. Here is a table comparing with some of the features.

comparison_table

Customers are using ITD for a multitude of use-cases.

  • Load-balance traffic to 256 servers of 10Gbps each.
  • Load-balance to cluster of Firewalls. ITD is much superior than PBR.
  • Scale up NG IPS and WAF by load-balancing to standalone devices.
  • Scale the WAAS / WAE solution.
  • Scale the VDS-TC (video-caching) solution.
  • Replace ECMP/Port-channel to avoid re-hashing. ITD is resilient.

Documentation:

Email Query or feedback:ask-itd@external.cisco.com

Improve Your Business Results with Mobility and Analytics

When it comes to delivering better business outcomes, many IT people could be sitting on a virtual goldmine – particularly when it comes to location analytics. Here are some new ways that you can extract more of that valuable information from your network, and some things to think about as you add new services and capacity.

Smart mobile device users are always looking to access information as they enter any public or private space. If you oversee IT for a shopping center, a hotel, a university or some other large venue, you know that every mobile device user can be an opportunity to:

  • Engage customers in new ways: Deliver relevant content, information, and services directly to customer’s mobile devices based on their location or personal preferences.
  • Understand customer behavior: Many organizations are not able to efficiently track the number of visitors, dwell time, or movement patterns. Imagine how much you could address visitor needs by gaining these insights.
  • Create new advertising revenue streams: Monetize your Wi-Fi infrastructure through third-party mobile advertising opportunities and mobile-influenced sales.

How can you make the most of this opportunity and connect with visitors to improve experiences, increase customer loyalty and drive sales?

Marlowe Mall

Read More »

Tags: , , , , ,

Prepare for Data Breaches! They Will Happen … to Anyone

September 15, 2014 at 5:05 am PST

Do you feel that you’ve been hearing a lot about data breaches lately? You are right! Take a look at the chart below. There is plenty of time left in September, but the data breach calendar is already filled with victim names. And August? I don’t even have enough space to put down all the victim names.

If anyone believes that if we do a great job, we can fully guard our data and valuable information assets against attacks and breaches, now it’s time to think again. The reality is, data breaches can happen to anyone. They are happening everywhere from household names, to lesser-known businesses or organizations, and  to the mighty government of the United States. The question is no longer “if”, it is “when”.

However, this does not mean that we will just give up. On the contrary, we need new thinking. And get prepared. We need to be prepared before breaches take place to minimize their chances to succeed. We need to be prepared during breaches to detect and stop them. And we need to be prepared to rapidly apply mitigations after breaches. We cannot totally eliminate these risks, but we can control and minimize them. Read More »

Tags: , , ,