Cisco Blogs


Cisco Blog > Enterprise Networks

Improve Your Business Results with Mobility and Analytics

When it comes to delivering better business outcomes, many IT people could be sitting on a virtual goldmine – particularly when it comes to location analytics. Here are some new ways that you can extract more of that valuable information from your network, and some things to think about as you add new services and capacity.

Smart mobile device users are always looking to access information as they enter any public or private space. If you oversee IT for a shopping center, a hotel, a university or some other large venue, you know that every mobile device user can be an opportunity to:

  • Engage customers in new ways: Deliver relevant content, information, and services directly to customer’s mobile devices based on their location or personal preferences.
  • Understand customer behavior: Many organizations are not able to efficiently track the number of visitors, dwell time, or movement patterns. Imagine how much you could address visitor needs by gaining these insights.
  • Create new advertising revenue streams: Monetize your Wi-Fi infrastructure through third-party mobile advertising opportunities and mobile-influenced sales.

How can you make the most of this opportunity and connect with visitors to improve experiences, increase customer loyalty and drive sales?

Marlowe Mall

Read More »

Tags: , , , , ,

Prepare for Data Breaches! They Will Happen … to Anyone

September 15, 2014 at 5:05 am PST

Do you feel that you’ve been hearing a lot about data breaches lately? You are right! Take a look at the chart below. There is plenty of time left in September, but the data breach calendar is already filled with victim names. And August? I don’t even have enough space to put down all the victim names.

If anyone believes that if we do a great job, we can fully guard our data and valuable information assets against attacks and breaches, now it’s time to think again. The reality is, data breaches can happen to anyone. They are happening everywhere from household names, to lesser-known businesses or organizations, and  to the mighty government of the United States. The question is no longer “if”, it is “when”.

However, this does not mean that we will just give up. On the contrary, we need new thinking. And get prepared. We need to be prepared before breaches take place to minimize their chances to succeed. We need to be prepared during breaches to detect and stop them. And we need to be prepared to rapidly apply mitigations after breaches. We cannot totally eliminate these risks, but we can control and minimize them. Read More »

Tags: , , ,

International Security Demands 100% Network Uptime

Nuclear security is a high priority international threat today. The Nuclear Security Summit (NSS) 2014 took place in The Hague, the Netherlands, following the summits in Washington D.C (2010) and Seoul (2012).

NSS 2014

Network Requirements:

An event of this magnitude required nothing but the best network solution. The venue had existing small networks across 5 buildings and 4 tents. They decided to disable the existing networks and setup a comprehensive Cisco network solution exclusively for this event. The major requirements were: Read More »

Tags: , , , , , , , ,

ITD: Intelligent Traffic Director

Data traffic has grown dramatically in the recent years, leading to increased deployment of network service appliances and servers in enterprise, data center, and cloud environments. To address the corresponding business needs, network switch and router architecture has evolved to support multi-terabit capacity. However, service appliance and server capacity remained limited to a few gigabits, far below switch capacity.

ITD (Intelligent Traffic Director) is a hardware based multi-Tbps Layer 4 load-balancing, traffic steering and clustering solution on Nexus 7xxx series of switches. It supports IP-stickiness, resiliency, NAT (EFT), VIP, health monitoring, sophisticated failure handling policies, N+M redundancy, IPv4, IPv6, VRF, weighted load-balancing, bi-directional flow-coherency, and IPSLA probes including DNS. There is no service module or external appliance needed. ITD provides order of magnitude CAPEX and OPEX savings for the customers. ITD is available on Nexus 7000/7700 series in NX-OS 6.2(8) or later. It is available for demo on Nexus 5k/6k. ITD is much superior than legacy solutions like PBR, WCCP, ECMP, port-channel, layer-4 load-balancer appliances.

Example use-cases: Read More »

Tags: , , , , , , , , , , , , , , ,

Scaling the Internet with 6500 Switches Ternary Content Addressable Memory(TCAM) Customization

The Internet routing table size has continued to grow steadily. In 2008 we reached 256K routes and now the table has exceed 512K Routes. This is of significance for customers running some of the older PFC3 based Supervisor 720 engines on the 6500 and 7600 switches.

On the Catalyst 6500 and 7600 Series platforms, all of the routing information is stored in special high-speed memory called TCAM. Read More »

Tags: , , ,