Cisco Blogs


Cisco Blog > Enterprise Networks

Going to Cisco Live Milan? Two keynotes to check out!

heads-lloyd

Tuesday of CiscoLive Milan (#CLEUR for the Twitter among you) the keynotes will be wall to wall Rob with Rob Lloyd at 9:30 followed by Rob Soderbery at 11:15.  These should be pretty interesting and give you a good foundation to where Cisco is headed overall and specifically in our core networking.

Opening Keynote with Rob Lloyd,President of Development and Sales, Cisco

Tuesday, Jan 28, 9:30 – 10:45AM

Hear from Rob Lloyd on how Cisco and the ecosystem of Cisco’s partners are uniquely positioned to connect the unconnected with an open standard and an integrated architecture from the cloud to end devices. Rob will share his vision of the Internet of Everything and examine the industry trends and technologies that are making that vision a reality.

  Read More »

Tags: , , , , , ,

IPv6 for Megatrends

It is pretty exciting to think about what is expected to happen in the ICT space over the next few years. On the other hand, is the network ready? Is IPv6 going to play a role in this space anytime soon?
I have asked Marco Misitano, Business Development Manager in my team about where are we on the transition to the new protocol and what we should expect coming in that space.

Marco, where do we stand today with IPv6?

IPv6 has come a long way! Not much happened until 2011, at the moment we finished IPv4 addresses. That is the moment when the snowball begins: we had the World IPv6 day in 2011 and that went so well in proving that IPv6 works at global scale, that in 2012 we had the World IPv6 Launch. That day many websites were enabled with the new protocol on top of the old, many home networking manufacturers provided IPv6 enabled out of the box and several ISPs started to provide IPv6 connectivity to residential users. All of this for good, not just for the day!

Read More »

17 Signs You Could Be A CiscoChampion for Enterprise Networks

Cisco Champions CVD Beach ReadingIf you see yourself in any of the following, you might be a Cisco Champion for Enterprise Networks.

  1. You’ve named your pet cat “6k”
  2. News of a new .11ac AP excites you
  3. CVDs are beach reading
  4. You can name more than 4 services offered on an ISR
  5. You know why there aren’t IOS ver. 13 nor 14
  6. Your home network scares some visitors. Others want to borrow it for study
  7. Downgrading someone’s QoS (allegedly) is your idea of a practical joke
  8. Your CCIE number is in your twitter profile Read More »

Tags: , , , , , , , ,

Access Control with Cisco TrustSec: Moving from “IP Addresses” to “Roles and Attributes”

Today’s enterprise is a highly dynamic, and hyper connected environment where IT plays a critical role in connecting the users, devices, resources and corporate IT systems. Today’s employees are also highly mobile in nature and do not necessarily have a single workspace assignment. The IT departments are constantly being challenged by the organization’s Line of Business owners to keep up with the pace of rolling out new services to address market needs, while keeping up with user expectations.

At the same time, IT departments also are responsible for ensuring business continuity and an uninterrupted service. However, the toughest challenge that any IT organization faces is implementing a security architecture which not only satisfies the compliance and industry regulatory requirements, but also provides a sufficient amount of protection against unauthorized access, data breaches, etc.

The traditional way to implement a security architecture in this kind of an environment is by implementing security rules in Firewall for traffic traversing the network’s extranet/intranet or data-center perimeters. For implementing security policies within an organizations network, Identity-Based Networking using IEEE 802.1X is generally used. Read More »

Tags: , , , , , , , , , , , ,

Getting to the Nuts and Bolts of Migrating to the Cloud

Once your organization has made the decision to move into the cloud what are the next steps? Making the decision can turn out to be the easy part, but turning your strategy and vision into reality can become a daunting task if you are not prepared. Purchasing a new SaaS application can be as simple as entering your credit card information and clicking on download. Delivering applications to your users from the Cloud poses a different set of challenges.

In my last blog post I talked about some of the key considerations you should make when moving workloads into the cloud. This month I am preparing for a webinar hosted by Cisco CSR1000V technical marketing engineers that will do a deep technical dive into each of those considerations with the goal of helping you to prepare for your migration. Some of the technical aspects we will discuss include how to handle IP addressing, security policies, redundancy for disaster recovery and much more. We will also go over a customer use case so you can learn from your peers. Read More »

Tags: , , , , ,