Cisco Blogs


Cisco Blog > Enterprise Networks

#IWANWed: Harness the Power of Web Within the Enterprise Branch

Cloud Web Security AAG ImageIn the ever-changing world of enterprise branch environments, a high number of businesses are planning to migrate their WAN to the Internet. To be exact, Nemertes Research (Benchmark 2012–13 Emerging WAN Trends) estimates that number to be close to 50%.  That’s 50% of businesses migrating to Internet for WAN.

And why is that happening? Enterprises are trying to optimize their WAN to increase ROI. Internet has become a much more stable platform, offering significant price-to-performance gains. Thus, the growth of new cloud traffic, high bandwidth applications, and video can be easily load balanced across multiple WAN lines, one of which or both can be Internet links. Some of the enterprises go even further and enable local Internet breakout from the branch. Not only does it eliminate the need to unnecessarily backhaul the traffic to the corporate HQ or data center, but also helps to free up the precious WAN bandwidth for critical business related applications. This enables enterprises to provide guest Internet access within the branch and then slowly offer the same services to corporate users, both for trusted public clouds applications and general Internet access. Read More »

Tags: , , , , , , , , ,

Your Network: Well-Kept Secret for Your Protection?

July 22, 2014 at 10:29 am PST

In my discussions with security executives who gathered at the recent Gartner Security Summit they recognized that unsecured access to the network is a critical threat vector.   However, when leveraged properly, the network itself also provides a significant platform that offers comprehensive protection to close those gaps. What does this mean?

Read More »

Tags: , , ,

Cisco Positioned As A Leader in the Gartner Magic Quadrant for Wired and Wireless LAN Access Infrastructure– For the 3rd Time in a Row!

Gartner has released their 2014 Magic Quadrant for Wired and Wireless LAN Infrastructure.  For the 3rd year in a row, Cisco is recognized as a leader in both vision and execution.  We believe this Gartner recognition is validation of Cisco strategy and investments for unified access, policy management and cloud managed solutions.

Cisco’s position in the Wired and Wireless Gartner MQs has been consistent over the past 3 years as the market landscape has shifted we believe validating our commitment to meeting shifting customer priorities and requirements.

Qartner Magic Quadrant 2014


This graphic was published by Gartner, Inc. as part of a larger research document and should be evaluated in the context of the entire document. The complimentary copy of the Gartner document is available to view here.

The 2014 Gartner Magic Quadrant for the Wired and Wireless LAN Access Infrastructure (Authors: Tim Zimmerman, Andrew Lerner, Bill Menezes; Published 26th June 2014) reflects the evolution from prior years and highlights what customers are looking for:

With limited growth in IT resources, administrators require one network management application, one access security solution, one guest access application or one policy enforcement solution with the flexibility to be deployed in a public cloud, private cloud or on-premises. This integration reduces the costs associated with the upfront capital expense of multiple network service applications each dedicated to either the wired infrastructure or the wireless or cloud components. This savings is also extended to the ongoing software maintenance costs of all access layer management, security and policy enforcement components.”

What Does Being a Leader Mean?

According to Gartner, ‘a vendor in the Leaders quadrant will have demonstrated an ability to fulfill a broad variety of customer requirements through the breadth of their access layer product family. Leaders will have the ability to shape the market and provide complete and differentiating access layer applications, as well as global service and support. Leaders should have demonstrated the ability to shape the market, maintain strong relationships with their channels and customers, and have no obvious gaps in their portfolios.’

Cisco’s Unified Access solution directly addresses today’s customer priorities with deployment options a variety of customer segments ranging from large enterprises to mid-size companies to organizations with broad IT expertise to organizations with lean IT staffs. In a recent press release Sujai Hajela, senior vice president of Cisco Enterprise Networking gives his thoughts on why Cisco has remained in the Gartner Magic Quadrant Leaders quadrant for three years.

Cisco has taken a customer-centric approach in order to meet the needs of enterprise organizations.  For those looking for a cloud-based approach, we offer the Cisco Meraki solutions.  For those who prefer the on-premise managed approach, Cisco continues to build on our traditional Unified Access Solution.

The Cisco Approach   

Cisco recognizes that not every IT organization is created equal, and we have developed solutions that align to whatever operation model those IT organizations feel will help them propel their business to the next level. Within both our cloud-managed and on-premise managed solutions the fundamental need to improve agility, simplify operations and deliver a high-quality user experience is inherent in both deployment models. I think this is what has helped Cisco stay in the Leaders Quadrant since the Gartner Wired and Wireless LAN Magic Quadrant has been introduced three years ago.
Overall, Gartner’s view is one that we feel Cisco shares with our ‘One Policy, One Management, One Network’ vision. First introduced in 2012, Cisco has delivered and expanded upon this vision for the last three years to help our customers achieve their business goals and simplify IT while addressing the rapid growth of BYOD, Mobility and the evolution toward the Internet of Everything.

To learn more:

Securing Your Network Before BYOD or IoT

If you’re a network engineer or have been following some of the recent trends in network security space, you may have come across terms such as “erosion of trust”, “zero trust ecosystem”, “the increased attack surface” and “new attack vectors”. What this means for a network engineer is that as application migrate from on-prem to cloud, and trends like mobility and IoT vastly expand the scale of assets and forms of access to be secured, traditional network security, which historically was centered around securing the perimeter of your network, is no longer sufficient.

Anatomy of Data Breach

I was recently reading the Symantec Internet Security Report. This report has been quite appropriately themed as “2013: Year of the Mega-Breach”. In particular, the Point-of-Sale type of attack, mostly prevalent in the retail segment of the market, is a great indicator of the anatomy of a typical breach. So I’ll use that as an illustrative example for the purposes of this post.

Read More »

Tags: , , , , ,

IWAN Wed: LiveAction 4.0 True Scalability at Any Scale

Screen Shot 2014-07-16 at 2.57.54 PMLiveAction 4.0, shipped in late June 2014, brings increased scalability to enable users the ability to see thousands of devices across their entire network on a single pane of glass. It provides centralized visibility and management enhancements while leveraging the intuitive user interface and robust troubleshooting capabilities that LiveAction has become known for.

Through a highly expandable architecture, LiveAction 4.0 provides a consolidated view for the entire network bringing central management and coordination of nodes, distributed analytics management and device interaction and configuration. This allows network administrators to easily troubleshoot and resolve performance issues in networks with multiple data centers and geographically dispersed branch offices.

Read More »

Tags: , , ,