Cisco Blogs


Cisco Blog > Data Center and Cloud

Cisco Professional Services for Cloud Ranked #1 in IDC Survey – Announced at CiscoLive!

June 26, 2013 at 3:07 am PST

Having been part of the team who developed the Cisco Cloud Enablement Services, our professional services to help customers enable and adopt cloud computing, I was absolutely delighted watching the CiscoLive! keynote yesterday to hear Padmasree Warrior announce the results of the March 2013 IDC market research study that showed Cisco come out on top for cloud professional services [Source: “2013 U.S. Professional Services Opportunities Related to Cloud Services”, IDC Doc # 239862, March 2013].

In this survey, as  the chart below shows (reproduced with the kind permission of IDC), respondents indicated that Cisco professional services were used most often across all of the three cloud categories that IDC measured: cloud applications, cloud application platforms, and cloud infrastructure.  Ahead of Accenture, Microsoft, IBM, Oracle/Sun, HP and others.

IDC March 2013 - Cisco Leads Professional Services for Cloud

Read More »

Tags: , , , , , , , , , , ,

Meet our Experts @ CiscoLive!

June 25, 2013 at 2:20 am PST

Some of our Cisco Services strategy and design consultants and leaders are at CiscoLive in Orlando this week.  If you are around, please take some time to learn from their hands on expertise.  They are the leading exponents in designing and deploying Cisco data center solutions.   If you’ve following my blog posts over the past few years, especially more recently on Cisco Domain TenSM and Cisco ONE as our solution for the challenges of SDN, you may well indeed be interested to meet some of the people behind the innovation and successful customer transformations.

 

Cisco Domain Ten - Cisco Services Framework for Data Center Transformation

Cisco Domain Ten -- Meet the Leading Cisco Domain Ten Experts at CiscoLive this week

 

We have a few presentations in the Cisco Campus Solutions Theater and also some “Design Centers”.

Read More »

Tags: , , , , , , , ,

Cisco Domain Ten: Domain 10: Process and Governance – Part (a)

June 21, 2013 at 10:33 am PST

So, with this blog, the end of my Cisco Domain Ten(SM) journey approaches.  Starting back in December, I’ve now covered each of the ten domains in our Cisco Services’ framework for data center transformation. A few weeks back, I discussed some of the challenges you may face in Domain 9: Security and Compliance, and it’s now time to discuss Domain Ten: Process and Governance, and the overarching challenges of operations management.  This is a hugely important topic so in this case I’ve split my blog into 2 parts, with this part (a) focused on your challenges, and the subsequent part (b) aimed at outlining how we in Cisco Services can help you address these operations management challenges.

Domain Ten: Process and Governance aka Operations Management

Domain Ten: Process and Governance aka Operations Management

The Cisco Domain Ten framework applies as much to service provider data center transformation as it does to business (enterprise) data center transformation.  In my Cisco Domain Ten series, I’ve often focused on enterprise challenges, so for this blog, I’ll focus on the operational challenges I’ve observed at first hand in the service provider environment.  That said, most if not all points I raise in this article will be equally applicable to enterprise/business and public sector data center operations.

Read More »

Tags: , , , , , ,

Securing the Internet of Everything: An Architectural View

As a follow up to my introductory blog on Securing the Internet of Everything, I would like to discuss further the security implications that will comprise proposed framework. As the applications of the IoT/M2M affect our daily lives, whether it is in the Industrial Control, Transportation, Smartgrid or Healthcare, it becomes imperative to ensure a secure IoT/M2M system. As the use of IP networks are employed, IoT/M2M applications have already become a target for attacks that will continue to grow in both quantity and sophistication. Both the scale and context of the IoT/M2M make it a compelling target for those who would do harm to companies, organizations, nations, and people.

The targets are abundant and cover many different industry segments. The potential impact spans from minor irritant to grave and significant damage and loss of life. The threats in this environment can be similarly categorized as those in the traditional IT environments. It’s useful to consider general platform architecture when discussing IoT security challenges. Below is the platform architecture that uses to frame IoT/M2M discussions.

While many existing security technologies and solutions can be leveraged across this architecture, perhaps especially across the Core and Data Center Cloud layers, there are unique challenges for the IoT. The nature of the endpoints and the sheer scale of aggregation in the data center require special attention.

The architecture is composed of four similar layers to those described in general network architectures. The first layer of the IoT/M2M architecture is comprised of Read More »

Tags: , , , , , , , , , , , ,

Summary: Securing the Internet of Everything: An Introduction

I recently kicked off a series about security and the Internet of Everything, a pivotal topic that starts with the roots of IoE, IoT and M2M, which I explore in more depth in the first post.

Machine-to-Machine connections make up a huge portion of the Internet of Things, both general concepts for the network infrastructures that link physical and virtual objects. These abstractions come together on IoE, making it possible for devices to orchestrate and manage the world we live in, as they become connected entities themselves.

But to fully discuss security on the Internet of Everything, we must first go back to the roots of IoE itself. The technology innovations that employ M2M and IoT were actually spun off from military and industrial supply chain applications. As IP became a more common communication protocol, IoT gained more traction, helped even more by the creation of IPv6 and other advancements in wireless technology. As ever-increasing data is captured and distributed on these networks, more intelligence is generated.

Read my full “Securing the Internet of Everything: An Introduction” blog post to learn more about this embedded intelligence that is a core architectural component of IoT, and how it informs the security for the Internet of Everything itself. And stay tuned! I have more for you to come in this series, including a look into IoE security framework.

Tags: , , , , , , , , , , ,