Cisco Blogs


Cisco Blog > Enterprise Networks

Don’t be a Victim – Part 2

Yesterday I talked about the vital importance of passwords in the quest to avoid victimization, but today I will take a look at how some recent changes and advances in technology can have an impact as well.

Some of the fundamental tenants of Borderless Networks include the fact that the network is evolving. No longer the classical, hard crunchy shell with the soft chewy middle, the network has become more open, more amorphous and more mobile. Because of these factors, the network is far more available and useful to users wherever they are, at home, on the road or even chilling at *bucks. Indeed, to illustrate the ubiquity of Borderless Networks, I even saw a woman emailing on a smartphone in the middle of a Zumba class (comic aside, my participation in Zumba is a lot like an inebriated bear doing ballet, but that is a different story). The network is no longer confined to the safe castle-keep of the Enterprise, but instead now follows us wherever we go. This creates opportunities, such as receiving email from the boss while you sip a latte at a coffee shop, but it also creates vulnerabilities as well, which we will come back to.

Read More »

Tags: ,

Don’t be a Victim – Part 1

One of the phrases sometimes heard in certain circles I have traveled in was “Don’t be a victim,” or its near cousin “Don’t allow yourself to be victimized.” While these words of wisdom were passed around in some of the rough, hard biker hangouts up in the Santa Cruz mountains, they are relevant to the world of Borderless Networks as well.

In terms of mitigating risk, one of the very best things you can do is actually one of the simplest. When it comes to passwords, pick a good one and use it. Mix in numbers, special characters, uppercase and lowercase and avoid names and dictionary words and you are going to be in a far better place. Oh, and as 4chan illustrated when they hacked a Christian dating site, never assume that your password will not be stolen – you may want to use different passwords. For mobile devices, which are prone to being left in various places, it is critical to have a password protected locking home screen.

Read More »

Tags: , ,

Why Video? Why Now?

The world is becoming flat.  Enterprises are optimizing the diverse talents and skills of employees and partners around the globe.  The challenge of globalization is to provide effective communication across distances and cultures. Enterprises must focus on improving collaboration. The use of video to communicate and collaborate, for information sharing or e-learning, is perhaps the closest alternative to actually being there, enterprises will be able to transcend physical location. For more information, Cisco conducted an interesting study, “The Psychology of Effective Business Communications in Geographically Dispersed Teams.

The cost of traveling represents a significant proportion of recurring operational expenses for many enterprises, so many of them are looking for ways to reduce travel costs. The key is to make travel more productive by reallocating travel time to videoconferencing for routine internal meetings, and using that travel budget to visit more customers. In addition to cost savings, enterprises are turning to video to show shareholders and customers that they are serious about reducing their carbon footprint and doing what they can to be a Green company.

Read More »

Tags: , ,

The medianet demo at NYC Interop 2010

Pervasive Video over the network is a topic that we’re hearing a lot about these days, with the recent Cisco launch, as well as stats being thrown around about the number of hexabites that video is consuming according to the Cisco Visual Networking Index (VNI).  But where is the proof of this? And how do I deploy and maintain all this video?

Here is one way.  In case you missed last week’s Interop IT Conference and Expo in NY, on Oct. 20 and 21st, 2010, the Cisco Medianet team presented a very cool demonstration highlighting current medianet technologies: IP SLA Video Operation, and Auto Smartports were on exhibition. These technologies help organizations deploy rich media services to:
•    Accelerate and ease video application deployments
•    Assist in validation of rich media service quality
•    Diagnose video issues and reduce time to resolution of problems

Read More »

Tags: , ,

Borderless Networks: Meat to Go

Yesterday we took a look at some concrete examples of Borderless Networks in the enterprise and home office.

Today, while we have seen that there is plenty of meat in Borderless Networks in the office, Borderless Networks has plenty of meat on the road as well. Bob, our enterprise worker, travels a lot, doing tradeshows and customer visits and dispensing Kool-Aid of various types. When he knows he is going to have to do some heavy lifting with PowerPoint he is sure to take a laptop running AnyConnect, a secure VPN client that works with the Cisco ASA firewall back at HQ to give secure, encrypted remote access. Even if he is in a coffee shop using public Wi-Fi, he knows that his data is safe because everything is going back through that encrypted tunnel. But it is more than just connectivity that we are talking about here because traffic goes through a Cisco Ironport web security appliance, filtering spyware, trojans and the like. And, just like when he is in the office, TrustSec ensures that he has access to what he needs and can’t touch the things he doesn’t. Security is deeply integrated into the network itself, not just an afterthought or add-on appliance.

Read More »

Tags: , , , , ,