Cisco Blogs


Cisco Blog > Enterprise Networks

How Aligned Are Business and IT Priorities?

Are Business and IT Groups Innovating Together -01.17.14

Innovation is critical to the success of every organization. According to a recent Cisco survey, 84% of business leaders agree that technology innovation is a critical or very important strategic differentiator for their companies. However, this survey also revealed that technology investments made by business and IT leadership are not always aligned. So how can business and IT work better together to deliver more innovation and business impact?

To address this challenge, we recently conducted the first phase of the Cisco Business and IT Priority Survey, which asked 1,800 business leaders globally about how their business and IT priorities are linked, and how these groups manage their innovation processes and technology investments. The good news is that 70% of business leaders indicated that their priorities and IT’s are aligned.

However, 67% of business leaders also said IT will influence less than half of the business technology budget next year. This means that two thirds of all organizations have an opportunity to better align IT and business technology spending, and deliver more innovation and business impact in the process.

Furthermore, this opportunity is growing as business’ investments in technology increase faster than IT’s. More than half of business leaders expect their technology budgets to increase up to 25% next year, and 11% expect their tech budgets to grow more than 25%. These business technology budget increases also vary widely by country – see the next installment in this series for details on our survey results different countries, industries, and business roles.

So how can business and IT better align their technology investments to deliver more IT innovation and business impact?

  1. Simplify – align and map technology and business priorities at every level. Then innovate with integrated solutions that map to more of your business priorities now – and longer term. For example, Fredericksberg Commune in Denmark reduce IT helpdesk incidents by 90% by integrating wired, wireless, routing and security technologies.

    Using SDN and automation capabilities, there are also many new ways to simplify IT and free up resources to fuel more innovation – across your entire network. See our upcoming CiscoLive! Milan announcements for more details on how to dramatically improve IT productivity.
  2. Unify – breaking down technology silos can yield huge ROI and, in turn, spur innovation. Two Cisco solutions that exemplify this principle of unity are Unified Access and Intelligent WAN. Unified Access, where policy, management and networks all work better together as one, can deliver orders of magnitude more capacity and performance than independent wired and wireless point products that may be deployed as separate initiatives. For example, the Hotel Principe di Savoia in Milan recently deployed an integrated wired/wireless solution, and plans to grow revenues by 15 to 20% by offering new guest services in addition to the outstanding guest experiences they’re already providing.

    Similarly, combining MPLS, Internet and 3G/4G-LTE into one Intelligent WAN can reduce overall costs by more than $500,00 annually for companies with 100 sites, and dramatically improve performance, security, and reliability in the process.
  3. Multiply – with the right network, you can add many innovative new services and applications, as well as capacity and performance more quickly to reach business goals sooner. For example, Copenhagen Airport is transforming passenger experiences by integrating wireless, mobility and location services in new ways.

    This potential value is in many current networks, but it’s even more important as the Internet of Things brings connectivity to billions of new devices and applications and previously unconnected things, changing business models in profound ways.

Because the alignment of IT and business priorities is so important for innovation and business outcomes, on January 27th, we’ll begin collecting and sharing these priorities on a global basis in the next phase of our Business and IT Priority Survey. With this intelligence, people can see how their priorities  compare to those of their industry peers, and we can all better understand how to drive business and IT together.

Our findings to date indicate that opportunities for innovation live in virtually every organization. Please join us in the coming weeks as we dive deeper into these results and show real-world innovation examples that will help your IT and business groups innovate and deliver more business impact than ever before.

Tags: , , , , , ,

Going to Cisco Live Milan? Two keynotes to check out!

heads-lloyd

Tuesday of CiscoLive Milan (#CLEUR for the Twitter among you) the keynotes will be wall to wall Rob with Rob Lloyd at 9:30 followed by Rob Soderbery at 11:15.  These should be pretty interesting and give you a good foundation to where Cisco is headed overall and specifically in our core networking.

Opening Keynote with Rob Lloyd,President of Development and Sales, Cisco

Tuesday, Jan 28, 9:30 – 10:45AM

Hear from Rob Lloyd on how Cisco and the ecosystem of Cisco’s partners are uniquely positioned to connect the unconnected with an open standard and an integrated architecture from the cloud to end devices. Rob will share his vision of the Internet of Everything and examine the industry trends and technologies that are making that vision a reality.

  Read More »

Tags: , , , , , ,

IPv6 for Megatrends

It is pretty exciting to think about what is expected to happen in the ICT space over the next few years. On the other hand, is the network ready? Is IPv6 going to play a role in this space anytime soon?
I have asked Marco Misitano, Business Development Manager in my team about where are we on the transition to the new protocol and what we should expect coming in that space.

Marco, where do we stand today with IPv6?

IPv6 has come a long way! Not much happened until 2011, at the moment we finished IPv4 addresses. That is the moment when the snowball begins: we had the World IPv6 day in 2011 and that went so well in proving that IPv6 works at global scale, that in 2012 we had the World IPv6 Launch. That day many websites were enabled with the new protocol on top of the old, many home networking manufacturers provided IPv6 enabled out of the box and several ISPs started to provide IPv6 connectivity to residential users. All of this for good, not just for the day!

Read More »

17 Signs You Could Be A CiscoChampion for Enterprise Networks

Cisco Champions CVD Beach ReadingIf you see yourself in any of the following, you might be a Cisco Champion for Enterprise Networks.

  1. You’ve named your pet cat “6k”
  2. News of a new .11ac AP excites you
  3. CVDs are beach reading
  4. You can name more than 4 services offered on an ISR
  5. You know why there aren’t IOS ver. 13 nor 14
  6. Your home network scares some visitors. Others want to borrow it for study
  7. Downgrading someone’s QoS (allegedly) is your idea of a practical joke
  8. Your CCIE number is in your twitter profile Read More »

Tags: , , , , , , , ,

Access Control with Cisco TrustSec: Moving from “IP Addresses” to “Roles and Attributes”

Today’s enterprise is a highly dynamic, and hyper connected environment where IT plays a critical role in connecting the users, devices, resources and corporate IT systems. Today’s employees are also highly mobile in nature and do not necessarily have a single workspace assignment. The IT departments are constantly being challenged by the organization’s Line of Business owners to keep up with the pace of rolling out new services to address market needs, while keeping up with user expectations.

At the same time, IT departments also are responsible for ensuring business continuity and an uninterrupted service. However, the toughest challenge that any IT organization faces is implementing a security architecture which not only satisfies the compliance and industry regulatory requirements, but also provides a sufficient amount of protection against unauthorized access, data breaches, etc.

The traditional way to implement a security architecture in this kind of an environment is by implementing security rules in Firewall for traffic traversing the network’s extranet/intranet or data-center perimeters. For implementing security policies within an organizations network, Identity-Based Networking using IEEE 802.1X is generally used. Read More »

Tags: , , , , , , , , , , , ,