Cisco Blogs


Cisco Blog > Government

Modcomp and Cisco Join Forces for Final Presidential Debate

This week South Florida’s Lynn University was taken over by the Commission on Presidential Debates (CPD) for the final debate of presidential candidates Barack Obama and Mitt Romney. Moderated by chief Washington correspondent for CBS News and Face the Nation moderator, Bob Schieffer, this debate was critical for the final polling outcome. Just on the Sunday prior to the event a Wall Street Journal/NBC News poll showed the race tied.

Cisco is proud to say that it took part in the behind the scenes. Lynn University partnered with longtime Cisco partner Modcomp to provide a secure environment for all data center and voice communications during the debate. Modcomp and Cisco beat out seven other firms vying for the opportunity. Lynn worked with Cisco and Modcomp to design solutions for the short term that could also serve the university in the long term so that the school is not simply buying technology for a single-time use.

Our Director of Government Strategies & Healthcare, Cassie Roach, recently discussed Cisco’s participation in the debate and how Cisco is enabling Lynn to bring the debate directly to voters. Cisco has extensive experience in providing products and services for events requiring reliability, flexibility, and scalability in their networks, including the London Olympics and each of the last three Democratic and Republication National Conventions.

Lynn, Modcomp and Cisco used technology and tools to scale live access and broaden the reach of the debate; this is the infrastructure Cisco provides. Specifically, the solution architecture included real-time intrusion detection and prevention, Network Access Control, self-provisioning guest portals, network monitoring and segmentation, and policy and bandwidth management and enforcement. The result:  A successful debate that allowed Lynn to meet the CPD’s stringent requirements and bring real-time communications and an unmatched user experience to voters.

Just how many resources went into this debate? The Miami Herald reported that more than 70 miles of cable was laid across the campus to broadcast the debate and pre and post shows. Additionally, nearly 3,500 media were credentialed to cover the debate.

Tags: , , , , , , , ,

How Do You Take Control of BYOD and Create a True Unified Workspace?

Want to know how to make sure your network is secure & meets compliance all while enabling a successful BYOD program?

OK, I admit that I’ve always been a techie wannabe, however I never quite made it to true techie level. So when the buzz around BYOD and unified workspace started a couple years ago, I was intrigued, and as it has built momentum and taken hold in so many organizations, I have taken an interest in understanding how it really works. Obviously, security, visibility and control are the big concerns, and to understand how those concerns are met, I found this video on Cisco’s Identity Services Engine (ISE) really helpful:

Read More »

Tags: , , , , , ,

Cisco Catalyst 4900M Earns USGv6 and Ready Logo Certifications!

The Global Certification Team (GCT) is pleased to announce the Cisco Catalyst 4900M on IOS version 15.1(1)SG or later has received USGv6 Certification from University of New Hampshire – Interoperability Laboratory. The UNH-IOL uses this collaborative testing model to distribute the cost of performing trusted, third-party testing and validation. USGv6 testing covers 27 categories of USGv6 NPD tests. You can find the listing for Conformance testing v1.2 (12424) at the UNH Interoperability Lab.  Additionally, the 4900M has also achieved Ready Logo certification.  the details can be found at https://www.ipv6ready.org/db/index.php/public/logo/02-C-000841/.

The Catalyst 4900M provides an ideal solution for space constrained deployments that require high performance wire speed services, high availability, and the modular flexibility of deploying Gigabit Ethernet and 10 Gigabit Ethernet, all in a small 2RU form factor.  You can find more information on the Cat4900M on Cisco.com

Get up to the minute updates on Cisco product certifications from the official GCT twitter,@CiscoCertTeam!

Tags: , , , , , ,

Cyberspace! The New Frontier!

We are currently in Cybersecurity month here in the United States, which is to say that our country is trying to raise our awareness in regard to our virtual protection.

So, Cyber Security? What is security for cyberspace…? It’s difficult at times to think of an imaginary border that protects networks, computers, programs and data from attack, damage or unauthorized access. Unauthorized access… so hacking? Yes, but more devious with results that could even lead to injury or death of our population.

Imagine what would happen if, all of a sudden, one of our major cyber systems were “hacked”… What does that mean for us? Think. Just about our whole existence revolves around cyberspace. That’s right, systems operate virtually to be able to manage simple things like pay roll all the way to complex things like flight plans, take-off and landing. Cyberspace is where your Facebook lives, Twitter, personal email accounts, and all of your personal finance information. Has your account ever been hacked by a friend posting a funny blurb on your account? Or has your identity been stolen by a hacker? With technology becoming an extension of ourselves, it’s just important to protect ourselves. Let’s not create an episode of J.J. Abrams “Revolution” if we can avoid it…

What can we do about it? That’s the point of this month is for “us”… yes, us plain ole citizens, to be more proactive in protecting ourselves, our communities, and ultimately our country.

This is what the Department of Homeland Security says about how we can start protecting ourselves:

“Americans can follow simple steps to keep themselves, their personal assets, and private information safe online. Here are a few tips all Internet users can do to practice cyber security during National Cybersecurity Awareness Month (NCSAM) and throughout the year:

  •  Set strong passwords and don’t share them with anyone.
  • Keep your operating system, browser, and other critical software optimized by installing updates.
  • Maintain an open dialogue with your family, friends, and community about Internet safety.
  • Limit the amount of personal information you post online and use privacy settings to avoid sharing information widely.
  • Be cautious about what you receive or read online – if it sounds too good to be true, it probably is.”

Here is a glance at Cisco’s part in cybersecurity.

Check out this blog by Chris Coleman titled “The Virtual Maginot Line” and also be looking for blogs by other members of Cisco that are revolving around Cybersecurity month.

This is very simple. We have roughly 2 weeks left in this month. Let’s all do our part.

Regards,

Mark Rogers

To learn more about the strategies mentioned in the video, visit OnGuardOnline.gov and DHS.gov/Cybersecurity.

Tags: , , , , , ,

Sustainable Cities & Technology: Insights & Final Thoughts from Meeting of the Minds 2012

I had the opportunity to attend Meeting of the Minds in San Francisco last week. It was an amazing event that brought together thought leaders from the world’s most innovative organizations to spotlight fresh ideas in urban connectivity and sustainability.

The emerging themes centered around innovation, leadership, and enabling connectivity. While there and after the first day of sessions, my team had the pleasure of catching up with Gordon Feller, director of the Cisco Internet Business Solutions Group (IBSG) Public Sector Practice, Urban Innovations team and convenor and co-founder of Meeting of the Minds, to capture his insights. Check out the video:

Read More »

Tags: , , , , , , , ,