Cisco Blogs


Cisco Blog > Data Center and Cloud

Are You Ready for Dev Ops and SDN Software Development with Cisco ONE?

April 5, 2014 at 3:10 pm PST

One of the great challenges of SDN – that many in my view underplay – is the change in paradigm from having a vendor deliver your network (hardware + software), to having (potentially) an ecosystem deliver your network – and this ecosystem may require you to develop software to perform network tasks or to integrate various SDN components together.  This was recognized quite astutely by consultant Jim Metzler, which I discussed in one of my earlier blogs“Applications can dynamically request services from the network” is what the SDN evangelists will tell you.  Jim astutely asked “How exactly do they do that?”.  Well ….. the true answer is that either (i) you need to buy [new] apps that do this off the shelf, as it were, or [more likely today] (ii) you need to modify your apps or develop new apps to do this. 

Coding - the New Networking?

Coding -- the New Networking?

So are you ready for procuring apps and/or developing software in your network design team now?  Don’t worry if you say “no”.  Let me first tell you a few customer reactions to this topic, and then let me update you on Cisco Services can help you develop new SDN apps that solve your specific network challenges.

Read More »

Tags: , , , , , , , ,

Summary: Navigating Security Threats in a Mobile World

Security plays an important role in the success of mobility implementations worldwide. We assume security threats are always present, however it’s not always apparent where threats may arise from. Being aware of these potential risk areas is crucial.

Business decision-makers must gain insight into where these breaches are occurring. They should also understand why it is important for them to care, and how they can be aided by technical decision-makers to solve these issues moving forward.

Here’s a brief look into the where, the why and the how of embracing a secure approach to enterprise mobility and what it means for business leaders.

Cisco_NavigatingSecurityMobileWorld

Where are security threats? Today’s organizations are facing a greater attack surface as advanced mobile devices and public cloud services foster new attack models and increasing complexity within networks. To cover the entire attack continuum, organizations need to address a broad range of attack vectors with solutions that operate everywhere the threat can manifest itself: on the network, on traditional endpoints, on mobile devices, and in virtual environments.

How can threats be thwarted? The best approach is a proactive one, rather than a reactive one, especially when many organizations may not know when they are under attack. Business leaders must work with IT teams to institute a formal program for managing mobile devices and to ensure that any device is secure before it can access the network.

Why does a balanced approach to mobile security matter? In a recent blog post, I discussed the need for organizations to deploy a balanced approach to mobile security. This approach should focus more on protecting the network and proprietary data and less on implementing overly broad restrictions. IT needs to approach security with a user experience mentality. After all, if you overly manage devices, your adoption will be low and so will your return on investment (ROI). This approach can lead to greater opportunities to align threat intelligence and security best practices.

To learn more about this balanced approach to mobile security, read the full blog: Navigating Security Threats in a Mobile World.

Tags: , , , , , , , , , , , , ,

Navigating Security Threats in a Mobile World

Security plays an important role in the success of mobility implementations worldwide. We assume security threats are always present; however, it’s not always apparent where threats may arise from. Being aware of these potential risk areas is crucial.

Since mobility solutions offer users the ability to use devices on a range of networks and in a wide array of places, threats may come in unsuspected ways, or be inadvertently introduced into your enterprises network. For example, one recent study reveals that 80 percent of corporate security professionals and IT leaders recognize that “end user carelessness” constitutes the biggest security threat to an organization.

In addition, information from the Cisco 2014 Annual Security Report sheds light on the persistent security attacks that enterprises face. From hackers to malicious malware, it’s clear that security threats arise from unsuspecting places.

Given this knowledge, business decision-makers must gain insight into where these breaches are occurring. They should also understand why it is important for them to care, and how they can be aided by technical decision-makers to solve these issues moving forward. In this post I’ll discuss the where, the why and the how of embracing a secure approach to enterprise mobility and what it means for business leaders.

Read More »

Tags: , , , , , , , , , , , , ,

Unlocking the Connected Guest Experience

A recent article in the Wall Street Journal featured a hotel that will soon be using mobile technology to bypass the check-in process. Guests will have the option to check-in through their smartphone and also use their smartphone as their room key.

The benefit of this new check-in and room key innovation is two-fold: the hotel guests will benefit from the pure convenience of it and hoteliers can help maintain a secure property.

Antonio Connected Guest Keyless_futureMobility_2 25 14

However, automated check-in and the ability to use mobile devices as a key to the room is only one aspect of the entire technology stay. This is just one component of what’s possible and what’s going to be expected by guests visiting hotel properties in the future.

There is a tremendous demand by the guests to simplify and enhance their interaction with the hotel. According to a recent HVS London study, more modern hotel guests value experiences and the feeling of “being connected” over traditional hotel luxuries. With this in mind, the future of a connected guest experience does not begin and end with new keyless door entry capabilities.

In fact, the new technologies happening in hotels are also happening across various industries. New mobile capabilities in retail, education and transportation are creating new ways for customers, students and citizens to receive engaging content that can transform their experience. Some examples include:

  • Retailers can offer shoppers mobile updates when they are in the store about new products and special sale items.
  • College freshman can receive turn-by-turn directions to landmarks, buildings and events – all based on the student’s schedule and current location on campus. Read More »

Tags: , , , , , , , , , ,

Cisco at CCBN: Transforming Video Experiences

By Hanh Tu, Vice President, Great Chinahanh tu

CCBN (China Content and Broadcasting Network), the biggest cable industry trade show in Asia is happening between March 20-22, 2014 in Beijing, China. Cisco will be showcasing many cutting edge innovations around cloud, mobility and video to our customers and partners at the show.

As we enter the Internet of Everything era, service providers and media companies face challenges in finding better models to monetize the video ecosystems. For example, MSOs need to identify ways to benefit more from the booming internet video service delivery models, or be left behind.  Cisco understands and embraces the customers’ challenges, and moves together to turn them into opportunities and innovations. Customers and partners will be able to experience Read More »

Tags: , , , , , , ,