CES and NRF kicked off 2015 with a bang, and as usual, showed us that there is no shortage of gadgets and dashboards to help businesses solve their every need.
From an IT perspective, choosing the right tools to solve each technology challenge should involve a full evaluation the merits of feature sets, while balancing the (rapidly shrinking) budget. But the business doesn’t wait – IT is flanked by consumer-mindset-driven employees and visionary execs eager to stay on top of buzz words like Big Data and Analytics.
Not coincidentally, we’re witnessing IT budgets shift over to Line of Business (LoB), a clear nod towards the business relevance of digital engagement.
In fact, 44% of mobility initiatives are now either completely funded or jointly funded by Line of Business (LoB) leaders.
This is a great opportunity for IT to align with LoB interests and drive programs that allow LoB and IT to successfully deliver business outcomes together using technology.
Read More »
Tags: analytics, beacons, Cisco CMX, wireless
If you are a fan of TechWise TV, like I am, then you are always curious as to what Jimmy Ray and Robb are going to delve into next. In the latest Techwise TV episode focused on Cisco Meraki cloud-managed IT, the TechWise guys have amassed a band of technical and cloud-managed experts to discuss what cloud-managed IT is really all about.
The TechWise TV guys will look at the Cisco Meraki solution to see if simplicity means reduced functionality, or if you need to sacrifice security to have a more agile solution. They will also discuss how data is handled, what it means from a business protection perspective, along with a lot of other top of mind questions.
Check out the latest episode here:
Tags: Cisco Meraki, cloud, Techwise TV
As more and more users and devices are connecting to the network via WiFi, Cisco has been focused on creating the best wired network to enable mission critical wireless:
- In 2013, we introduced Catalyst 3850 & 3650 Stackable Converged Access Switches for wired & wireless networks. These switches simplified networks by combining separate wired and wireless networks into a single platform. This simplification makes IT agile. These switches also enabled a better user experience through deeper application visibility across wired and wireless with Cisco Flexible NetFlow. Click here to see an interactive demo showing the other benefits of our converged access switches.
- In 2014, we expanded the converged access portfolio by introducing Converged Access on Catalyst 4500E, our lead modular access platform.
- Today, we take the next big step in our wireless strategy by introducing Cisco Catalyst Multigigabit technology across several campus switches: Catalyst 4500E, 3850 and 3560-CX.
So, what problem does Cisco Catalyst Multigigabit technology solve? Read More »
Tags: access switching, Catalyst 3560-CX, Catalyst 3850, Catalyst 4500E, NBASE-T, wifi
Security is hot topic on everyone’s mind and for IT it is a constant challenge to stay ahead of the latest threats and vulnerabilities that their organizations face on a daily basis. Take a quick look at the news and it won’t take you long to find an article talking about the latest cyber attack that resulted in the leak of personal data. So what can organizations and more specifically IT teams do to protect themselves from threats and vulnerabilities. Personally I don’t think you can protect yourselves from all threats and vulnerabilities. Cyber threats will continue to exist and cyber criminals will continue to develop increasingly sophisticated attacks to evade even the most robust security barriers. Even if you were to isolate your network from the internet an intruder could overcome your physical security and launch an attack from within your organization.
So what can you do to protect yourself? I view security as a way to reduce your exposure to threats and you should at a minimum make sure you have the appropriate security measures in place to reduce your exposure to threats and vulnerabilities. While you may never be able to stay one step ahead of cyber attacks you should be in a position to detects threats and be able to mitigate them as fast as possible to reduce your exposure.
Read More »
Tags: Advanced Malware Protection, AMP, Cloud web security, CWS, DMVPN, firewall, IDS, IPS, ISR 4000, ISR4k, IWAN, routers, security
The wireless world is going through rapid changes. 802.11ac, the fifth generation of WiFi, is poised for accelerated deployment which will dramatically change the user experience with more bandwidth, more speed and a higher number of concurrent client connections. In fact, nearly a quarter of all new access points in the enterprise are now 802.11ac, as suggested in a December 2014 Infonetics WLAN market report. Read More »
Tags: 6.8 Gbps, 802.11ac wave 2, access switching, Catalyst switching, Cisco Live Milan, mu-mimo, multigigabit, NBASE-T Alliance