Cisco Blogs


Cisco Blog > Government

Borderless Networks Will Set You Free! – Telework for Government

July 18, 2011 at 6:13 pm PST

There is a lot of buzz out there right now about Telework Solutions for Government as many agencies are making the transition that so many Corporations have already completed.  Personally, I haven’t worked full time in an office since pre-1996 and can’t imagine wasting that much time every day on preparations and commuting for no real purpose other than donuts, coffee and the latest office gossip.

Work is an activity, not a location in today’s professional world with pervasive networking capabilities and the Government is getting on board under the leadership of the current administration.

If you want to get a feel for the progress and momentum around this,  check out the public/private partnership at the Telework Exchange site focused on eliminating the Telework Gridlock.  Cisco is one of the sponsors of this activity because we see the value, have lived it for better than 15 years,  and can offer solutions to help make this a reality for our Government customers. Read More »

Tags: , , , , , , , ,

Even Security Administrators Deserve a Break – Part 2 of 2

June 23, 2011 at 8:27 am PST

In my last post on this topic, I highlighted just how true the words “Work is no longer a place you go, but what you do” really are. We now have the ability to work anytime, anywhere, using any device. As easy as this has made the lives of workers all over the world, it’s made the lives of security administrators immensely difficult. Providing secure access to the corporate network in a borderless world, while still somehow keeping out the bad stuff, has caused traditional security policies to become increasingly difficult to configure, manage, and troubleshoot – the source of inordinate amounts of pain for security administrators.

That’s why Cisco has introduced identity-based firewall security as a new capability of the ASA platform. As the first installation of what will soon become full context-aware security, identity-based firewall security enables security administrators to utilize the plain language names of users and groups in policy definitions. Rather than authoring and managing the growing list of IP addresses to cover every possible location, device, or protocol that may be required for secure access to the network, identity-based firewall security enables security administrators to grant access to “Jeff.” Regardless of where I am or what I’m using for access, I’m still Jeff… so in the simplest case, my administrator can literally write one policy to provide “Jeff” access to the corporate network, rather than six different IP addresses for all the instantiations of Jeff.

Read More »

Tags: , , , ,

A Firewall for Every Occasion

April 1, 2011 at 8:56 am PST

Few people in the world would disagree that a network firewall is an essential component for any size datacenter. In fact, operating without one could be considered by many to be network asset suicide! But adding a firewall to an existing datacenter is by no means a trivial task. In fact, the amount of work that would be required to re-cable every physical interface to properly tie it in with the rest of the network is enough to make many network administrators think twice about just how badly they really need that shiny new firewall, versus just sticking with what they have. Add to that the additional rack space, power, cooling, and management required by the new device, and some serious ROI questions may be raised.

Read More »

Tags: , , ,

How Do You Plan for 2011 – Part 3: Embrace Mobile Computing the Smart Way

January 21, 2011 at 8:25 am PST

Gadgets, gadgets and more gadgets. They are coming like mushrooms after a soaking spring shower.  More than 80 tablets were launched at the Consumer Electronics Show (CES) in early Jan. On top of that, Microsoft announced that a future version of its Windows OS will run on ARM-based chips that power mobile phones and tables, in addition to the x86 chips used for PCs. A 4G wireless version of Cisco’s mobile business tablet Cius made news with a joint announcement with Verizon Wireless. It’s a sign of the times that the buzzword “app” was voted the 2010 “Word of the Year” by the American Dialect Society. And one more thing: IDC predicts that in 2012, the number of mobile devices is likely to reach 462 million, exceeding PC shipments.

Today, almost one in five (18%) employees is not allowed to use their iPods at wok, based on Part II of Cisco’s Connected World Report.  But this trend is unlikely to continue.  Employees expect to have more flexible work options including mobility.  So how do you prepare your organization’s mobile computing strategy, to help achieve best employee productivity and user experience?

Read More »

Tags: , , , ,

TechWiseTV and Application Velocity

November 10, 2010 at 8:41 am PST

Welcome to the shownotes for TechWiseTV 78: Borderless Networks: Optimizing Application Velocity.  Have you seen the show yet?  It is live starting 10 AM PST November 11. All the talk about ‘cloud’ and ‘virtual this and that…’ from your servers to your desktops…its the renaissance we have all been told about before it seems. What is the most important ‘make or break’ reality ALL of us have to live with? Three Areas: (1) User Experience, (2) Resource Utilization, (3) Application Reliability.

Here is a cheesy preview:

Read More »

Tags: , , , , , , , , , , , ,