Are you looking at more than just connectivity for your retail sites? As a financial or banking customer, do you need a smart and secure ATM solution? Is network bandwidth cost reduction top of the mind for your business? Are you a service provider looking at reducing your costs while improving your service offering? Is wireless the primary mode of connectivity for you but you don’t know which provider to go for? If you are any one of these, you don’t want to miss the new ISR 800M launch at Cisco Live Cancun.
Make sure you register for PSORST-2800 session for more details and see the product live at the Cisco Enterprise Solutions booth at the World of Solutions.
If you have been following Cisco Blogs, attending CiscoLive, or reading industry publications like Network World, you’ve probably heard about Cisco’s Intelligent WAN or IWAN solution. For those of you that haven’t been in the loop, have more questions, or are just plain curious about the Intelligent WAN, we have a short webinar series kicking off on the 6th of November at 10am PST. We will cover the important building blocks for architecting your hybrid WAN infrastructure including:
- Defining the Hybrid WAN
- In-depth technical analysis of Cisco’s Hybrid WAN Solution: IWAN
- How IWAN can help to lower your IT costs
If you belong to an IT organization that is centralizing applications in the public or private cloud to gain efficiencies or are migrating the Internet edge in your branch offices to take advantage of software as a service (SaaS) applications, then make sure you attend this live 60-minute webcast, the first of a four-part series. We will show you how a hybrid WAN architecture can help you deliver a consistently high-quality end-user experience while actually reducing your WAN operating costs.
Still not sure if IWAN is for you? Consider these other trends that might be happening in your enterprise network today that could end up causing many sleepless nights in the future:
- Mobile devices continue to proliferate, and high-bandwidth applications such as video are becoming more and more commonplace, putting pressure on the WAN.
- According to Nemertes, most organizations’ WAN budgets will remain flat or decline in 2015, meaning that adding bandwidth is often not an option.
Join our Cisco experts and bring your questions with you!
Tags: Intelligent WAN, IWAN, mobility, network infrastructure, WAN architecture, wireless, wireless network
Today, Cisco, Aquantia, Freescale and Xilinx announced the founding of the NBase-T Alliance. Key goals of the alliance are as follows:
- Promote collaboration and dialogue for developing technology to enable speeds greater than 1Gbps on existing Category 5e and Category 6 cabling infrastructure.
- Work in conjunction with standards bodies to standardize speeds greater than 1Gbps on existing Category 5e and Category 6 cabling infrastructure.
The IEEE 802.11ac Wave 1 standard has already delivered 1 Gigabit wireless speeds to enterprise access networks. Soon, the industry will introduce 802.11ac Wave 2 products that could deliver wireless speeds up to 6.8Gbps. Similarly, products based on 802.11ad standard could deliver speeds up to 7Gbps. And the 802.11ax standard while in its formative stages has a goal to quadruple the throughput in the 5GHz band. Other emerging technologies such as Li-Fi could also facilitate access networks in the multi-gigabit range for the Internet of Everything.
Read More »
Tags: 802.11ac, 802.11ax, Li-Fi
Seven billion. That’s the number of mobile-connected devices that will be trying to get on networks this year. Now you’re probably not going to be hosting all 7 billion of them, so let’s try this number – 4. As in, “the average number of devices that enterprise users have” is roughly 4 devices*. Go ahead – do the math with your own employees. For Cisco, that’s around 250,000+ devices or so attempting to connect to our network. As a company, you may have more, you may have less…but the one thing you definitely have are employees who are eager to access your network with more of their own personal devices than ever before.
Great for employees, right? Absolutely. However, this, generally, gives enterprises two major dilemmas:
1) They lack any visibility into or context around who and what is getting on the network – Is it a smartphone? Is it a smartphone with the latest OS? Is it a smartphone supported by the enterprise?
2) They’ve lost the stringent control they used to have over what’s getting onto the networks. Sure – rules are defined for users, but maybe they’re not really being enforced. Or maybe “shadow IT” is just going around the rules to get someone’s new cracked Android tablet online.
This, generally, also gives network administrators heartburn…and for good reason. They’re stuck walking that fine line between security and productivity. How can they secure the enterprise and network access without making life miserable for their users…and themselves?
In our experiences here at Cisco, we’ve discovered that tackling these challenges requires a few things:
1) Find a way to accurately identify who and what is getting on the network
2) Centrally manage user access policy and use the identity to assign everyone the right network access
3) Make it easy for users to actually get onto the network – however they connect
4) Keep an eye on the network for threats and then quickly neutralize those threats.
If you can find a way to do each one of those things, you’ve taken a big first step in addressing these dilemmas.
Dynamic Control with Context
At Cisco, we’re helping organizations tackle these challenges every day with the Cisco Identity Services Engine (or “ISE”). Cisco ISE is an access policy platform that unifies and automates secure access control to network resources.
1) Accurate Identification – Cisco ISE grabs contextual data from a wide variety of sources (e.g., Active Directories, sensors, NetFlow) across the network to offer clear visibility into every connected device. It also offers advanced profiling technology as well as a curated profiling update service to ensure that all these connected devices are accurately identified and classified.
2) Centralized Access Policy – Cisco ISE gives enterprises the power to centrally define and manage the right types of access for users and devices. ISE can take written, granular business policy and make it real secure access policy, enforced across the network.
3) Easy Onboarding – New simplified onboarding experiences provide intuitive user access on branded portals, without sacrificing security, for a wide variety of enterprise deployments – from guest hotspot to “BYOD” projects.
4) Rapid Mitigation and Remediation – Cisco ISE can take all that collected contextual data and share it with integrated partner solutions. By delivering a deeper level of context, ISE makes it easier and faster to identify, mitigate, and take action to remediate non-compliant mobile devices, compromised endpoints, or other network threats.
Cisco ISE provides enterprises with greater visibility into who and what is on the network. This leads to more accurate identification, which, in turn, allows enterprises to assign the right access control to an end-user and device…easily and securely.
So, when that day comes where some of those 7 billion devices end up on YOUR network, you know you’ll be ready to tackle those challenges with Cisco ISE.
Please join us on November 5, 2014, for a live, 60-minute webcast where we’re offering a sneak peek at the newest version of Cisco ISE. Space is limited, so register today!
*Citrix, “Workplace of the Future: a global market research report”, September 2012 http://www.citrix.com/content/dam/citrix/en_us/documents/products-solutions/workplace-of-the-future-a-global-market-research-report.pdf
Tags: control, Easy Onboarding, Identity Services Engine, ISE, visibility
In a Technology Vision 2014 report, consulting firm Accenture discussed major trends that drive a dramatic transformation for every business to enter a digital world. As they described, the excitement is to change from being “digitally disrupted” today to “digital disrupters” tomorrow. The huge opportunity is for businesses position themselves as leaders in this new world.
Many forces are at work in the journey of this remarkable transition. Among them, three dominant factors will play a vital role to determine whether this digital transformation will be successful: an intelligent information edge, IT simplicity and cybersecurity.
At the edge of the new digital world, intelligent and real-time technologies allow people to act and react faster to achievebetter experience and outcome. While mobile device explosion serves as a clear indicator of this rapid transition, greater potential lies ahead to fully utilize the power of mobility, analytics, cloud computing and other new technologies. For a preview of what is possible, check out how Fernbank Natural History Museum integrates 3G/4G and Wi-Fi seamlessly. The outcome is an dynamic application that brings an immersive and interactive experience to the visitors, instead of forcing them to find the information.
Technical complexity arises, as more and more applications, systems and infrastructure are added together over time. Cisco Global IT Impact Survey in 2013 found that nearly three out of four IT participants (71 percent) were deploying more applications than a year ago. Without IT simplicity, IT departments will be rapidly consumed by day-to-day fire drills. They will lose their ability to innovate and their relevance to the business.
Read More »
Tags: Catalyst 3850 switches, Catalyst Switches, cybersecurity, digital, intelligent information edge, IT complexity, IT simplicity, network security