It’s 6 a.m. on a Saturday. Filled with excitement and anticipation, I watched as my hot air balloon, the last one in the bunch, inflated. Around me, one after another, balloons started to float effortlessly off the ground into the air. The Napa Valley’s sun glittered in the distant as my balloon finally took off. At 1,050 feet, some fogs rolled by, then I saw it: a shadow of my balloon in the fog encircled by a rainbow – see the picture above, top right. I quickly pulled out my iPhone 6, snapped a panoramic, and posted it on Facebook. It was the most mesmerizing experience ever, not just because of the experience itself, but also because I can share it with my families and friends via 4G LTE. However, 4G LTE isn’t just for smartphones.
Connecting the Unconnected
The world of things, a.k.a Internet of Things (#IoT), around us is connecting in ways beyond imagination. According to a November 2014 issue of the Harvard Business Review, “Smart, connected products are changing how value is created…(and) will affect the trajectory of the overall economy, giving rise to the next era of IT-driven productivity growth for companies, their customers, and the global economy.” For example, just-in-time inventory replenishment, powered by connected vending machines, enables one business to capitalize on OpEx savings and increase revenue per unit. Wireless monitoring allows an oil and gas company to quickly respond to pipeline issues in rugged, remote locations. Connected lightning empowers one smart city to reduce crime rate and improve its residents’ quality of life. Even one’s personal space, such as the home, is becoming more connected with the use of #WEMO products and smart devices integration (those coming to #CES, you must see the Connected Home demo). This Digital Transformation, powered by 4G LTE, brings about considerable improvements in the ways we work, live, and play. Read More »
After several days of attending Cisco Live, I’m excited about what I’ve seen and heard. Not just from my Cisco colleagues but from customers who are transforming their businesses by using their networks in new and previously unimaginable ways. Today’s business call to action, “Disrupt or be disrupted,” couldn’t be more true.
In my blog before Cisco Live, I described how we decided to combine our two most popular enterprise support services to create one powerful and flexible service. Converging SMARTnet with Smart Net Total Care under the name of Smart Net Total Care allows you to choose the basic network support capabilities traditionally found in SMARTnet, as well as reach higher to access the proactive smart service features of Smart Net Total Care. In doing so, you can optimize the full lifecycle of all your Cisco equipment. This consolidation creates more flexibility and more value for you when it comes to selecting a single solution that supports all your company’s Cisco network devices. Learn more here:
In my last blog, I also shared with you five of the most popular user applications of Smart Net Total Care based on customer feedback. Now, I’m sharing the final five applications to complete the ten smart ways to keep your network up and running smoothly and reliably – and to protect it from unnecessary risk. As a reminder, I’ve included the first five. Skip to number 6 if you’re already familiar with them.
1. Simplify Contract Management
Many customers use the contract management features of SNTC to simplify how they manage their Cisco service contracts. It provides a consolidated view of all the Cisco devices in the network and their support contracts. This visibility can help dramatically reduce the number of contracts and result in less administrative overhead, faster renewals and timely product refresh. If you’re not familiar with how to take advantage of this functionality, take a few minutes to check out this video. It demonstrates how you can plan for service coverage renewal and save hours and even days managing your contracts in the future.
2. Save Installed Base Management Time
Time is your most valuable resource … yet you never have enough. Freeing up time from routine network maintenance tasks helps you focus on more strategic IT assignments. SNTC lets you eliminate steps – and accelerate others – in your IB management process. Learn how you can get more out of your day with time saving tips found in this video. Read More »
Today, Cisco is announcing the Cisco Catalyst 6840-X and 3850 10G Fiber Series for campus backbones to address new network infrastructure needs, especially in space constrained deployments.
According to the Visual Networking Index, traffic is expected to triple in the next four years. This means that many campus networks will lack the provisioned capacity to meet this expected growth in bandwidth. In fact, some network managers are telling us that this is already happening to their campus networks.
With video and bandwidth-intensive applications continuing to proliferate, traffic on campus networks is growing exponentially. This drives not only the challenge of managing the demand for growing scale in a secure and reliable fashion, but also the opportunity for IT to leverage video and robust applications to “add value to the business”. Customers and suppliers are gravitating to businesses that offer them a comprehensive view of product offerings, an instant response, and easy transactions. This also drives additional demands on the network as an enabler for the business.
Things are changing with employees as well. While many employees are provided a mobile phone, most already have at least three mobile devices including laptops, tablets and even private smart phones. Even when employees are not actively using the apps on their mobile devices, these devices can create additional background traffic (OS, App updates & backups). According to a Cisco IBSG study, there are three times more devices per person than just a few years ago. Virtually all devices connect through the employer’s network, which has to service all these devices in a secure, scalable and reliable fashion.
While devices grow in number, wireless connectivity speed is increasing. Gigabit wireless (802.11ac) enables a network that is three times faster due to its 1.3 Gbps capacity. 802.11ac Wave 2 more than doubles that. Thus, the bottleneck is moving “up the network” from wireless AP to the access uplinks. With 1G becoming the standard for access switch ports, access switch uplinks will need to move to ubiquitous 10G and 40G. Read More »
Two weeks ago, a leading global medical device manufacturer came to Cisco for advice. In an effort to streamline IT operations and reduce operating costs, the customer had recently migrated from their internal Microsoft Exchange 2010 environment to Office365, Microsoft’s hosted online service.
The migration was initially done for the headquarter users and the feedback was more positive than they expected. However, when they migrated their branch and remote office users, the WAN bandwidth usage almost immediately spiked and user experience suffered as a result.
This customer is certainly not the only company looking to embrace Cloud applications for greater agility, reduced costs and complexity, and increased productivity. Or has had to deal with BYOD issues and the increasing impact of video has on their bandwidth. However, what our customer and those other companies have found is that the current method of backhauling the traffic to the data center is no longer a viable way to handle the increased consumption when faced with a flat or even a declining IT budget. Therefore, many of today’s distributed enterprises are looking to use direct Internet access pathways in an effort to improve the user experience while reducing IT costs.
However, enabling direct Internet access (DIA) at branch offices also forfeits the inherent threat protection that traffic routed through the data center provides. The enterprise-level risks that branch offices face with BYOD issues, compliance requirements, and advanced persistent threats require enterprise-level security. According to Gartner’s “Bring Branch Office Network Security Up to the Enterprise Standard”, “By 2016, 30% of advanced targeted threats — up from less than 5% today — will specifically target branch offices as an entry point.”
The Digital Economy and the Internet of Everything means everything is now connected. Digitization is fundamentally transforming how we conduct business. It creates new opportunities to develop services and engage with employees, partners, and customers. It’s important to understand that digitization is also an opportunity for the hacking community, presenting new services, information, data, devices, and network traffic as attack targets. To take full advantage of the digitization opportunity, security must be everywhere, embedded into and across the extended network – from the data center to the mobile endpoints and onto the factory floor.
Today, Cisco is announcing enhanced and embedded security solutions across the extended network and into the intelligent network infrastructure. These solutions extend security capabilities to more control points than ever before with Cisco FirePOWER, Cisco Cloud Web Security or Cisco Advanced Malware Protection. This is highlighted in Scott Harrell’s blog. We are also transforming the Cisco network into two roles: as a sensor and as an enforcer of security.
The role of the Network as a Sensor The network provides broad and deep visibility into network traffic flow patterns and rich threat intelligence information that allows more rapid identification of security threats. Cisco IOS NetFlow is at the heart of the network as a sensor, capturing comprehensive network flow data. You can think of NetFlow as analogous to the detail you get in your monthly cellular phone bill. It tells you who talked to whom, for every device and user, for how long, and what amount of data was transferred – it’s metadata for your network traffic.
Visibility to network traffic through NetFlow is critical for security, as it serves as a valuable tool to identify anomalous traffic on your network. Watching NetFlow, we gain an understanding of the baseline traffic on the network, and can alert on traffic that is out of the ordinary. The network is generating NetFlow data from across the enterprise network all the way down to the virtual machines in the data center. This gives us visibility across the entire network, from the furthest branch office down to the east-west traffic in the data center. Read More »