In this blog, let us take a look at how Catalyst access switches enable and enforce context aware access to IT resources.
Many types of devices, including laptops, smartphones, and tablets, are used by end users to connect to the network wired, wirelessly, and remotely through VPN. With bring your own device (BYOD) access, the devices can be personal or corporate owned. Every enterprise has policies that dictate who can access what applications and databases, when and how. Traditionally, IT manages the policy either by introducing appliances at points in the campus where users connect or by manually configuring all the access switches. Appliances incur additional capital and operational expenses, whereas manual configuration of the switches requires maintenance of every switch. Moreover, the network can carry traffic using Ethernet, IPv4, IPv6, or other technologies, so the configuration must keep up with changes in technology, which leads to higher operational complexity and costs.
Read More »
Tags: 3560-X, 3750-X, 4500E, Cat 6500, catalyst, context-aware, secure access, Security Group tags, SGT
Often we focus on the challenges associated with IT with little consideration of the end user viewpoint. In Cisco’s Work Your Way Global Study, completed in January of 2013, we polled over 1300 IT professionals and business-focused end users around the globe to investigate how BYOD is not only affecting IT, but how the challenges directly impact the end user experience. We were curious to compare and contrast the different viewpoints to understand if the difficulties IT was facing had an impact on how end users get their devices on the network, access business applications and perform day-to-day activities on the move. Based on these results we created an Infographic that talks about the challenges and provides key insight to what the results mean. Read More »
Tags: Borderless Networks, byod, Cisco, infographic, mobile devices in business, one management, One Network, one policy, unified access
Presbyterian Communities of South Carolina (PCSC) is a not-for-profit organization that operates a network of retirement communities. With nearly 800 residents across five locations, PCSC needed to collaborate and enhance their IT network to better connect residents, their guests, and secure business needs such as patient monitoring, marketing, and fund raising. Read More »
Tags: Case Study, Connected Mobility Experiences, customer, MobilizeMag, Updated Network, use case
Almost anywhere you go nowadays, you have internet access at your fingertips. With the trend of smart phones, tablets, and other personal devices taking flight, we’re just a touch away from being connected – and with that comes high expectations.
Not only are we experiencing an influx of mobile users, but these devices are being incorporated into the workspace. In order to support this influx, we need a simple, unified network that ensures the greatest experiences for employees as well as consumers.
Cisco® has a brand new resource suited specifically to help you understand and meet these expectations. It is called Cisco Mobilize, and features best practices, expert advice, and customer stories regarding the latest in creating a unified mobile workspace. Read More »
Tags: byod, MGM, MobilizeMag, one management, One Network, one policy, unified access, wireless
In my previous blog I introduced the concept of Cisco Cloud Connectors, which help enhance cloud services for customers and partners, and listed the latest Cisco Cloud Connectors.
Today I am excited to share the next round of Cisco Cloud Connectors developed with third-parties and just announced at Cisco Live London! These Cisco Cloud Connectors expand further into a broad set of cloud-based applications and were developed by a growing list of third party partners. These new Cisco Cloud Connectors help address pain points in various domains such as storage, hospitality, security, VDI, identity, shipping and digital signage. Read More »
Tags: CIN, Cloud Connectors, Cloud Intelligent Network, CTERA, Desktone, Industry Weapon, ISR G2, Maginatics, Nevotek, Panzura, Ping Identitly, Ping Identity, SecureLogix, Setel Hellas, Unitrends