Few people in the world would disagree that a network firewall is an essential component for any size datacenter. In fact, operating without one could be considered by many to be network asset suicide! But adding a firewall to an existing datacenter is by no means a trivial task. In fact, the amount of work that would be required to re-cable every physical interface to properly tie it in with the rest of the network is enough to make many network administrators think twice about just how badly they really need that shiny new firewall, versus just sticking with what they have. Add to that the additional rack space, power, cooling, and management required by the new device, and some serious ROI questions may be raised.
Gadgets, gadgets and more gadgets. They are coming like mushrooms after a soaking spring shower. More than 80 tablets were launched at the Consumer Electronics Show (CES) in early Jan. On top of that, Microsoft announced that a future version of its Windows OS will run on ARM-based chips that power mobile phones and tables, in addition to the x86 chips used for PCs. A 4G wireless version of Cisco’s mobile business tablet Cius made news with a joint announcement with Verizon Wireless. It’s a sign of the times that the buzzword “app” was voted the 2010 “Word of the Year” by the American Dialect Society. And one more thing: IDC predicts that in 2012, the number of mobile devices is likely to reach 462 million, exceeding PC shipments.
Today, almost one in five (18%) employees is not allowed to use their iPods at wok, based on Part II of Cisco’s Connected World Report. But this trend is unlikely to continue. Employees expect to have more flexible work options including mobility. So how do you prepare your organization’s mobile computing strategy, to help achieve best employee productivity and user experience?
Welcome to the shownotes for TechWiseTV 78: Borderless Networks: Optimizing Application Velocity. Have you seen the show yet? It is live starting 10 AM PST November 11. All the talk about ‘cloud’ and ‘virtual this and that…’ from your servers to your desktops…its the renaissance we have all been told about before it seems. What is the most important ‘make or break’ reality ALL of us have to live with? Three Areas: (1) User Experience, (2) Resource Utilization, (3) Application Reliability.
Here is a cheesy preview:
Yesterday we took a look at some concrete examples of Borderless Networks in the enterprise and home office.
Today, while we have seen that there is plenty of meat in Borderless Networks in the office, Borderless Networks has plenty of meat on the road as well. Bob, our enterprise worker, travels a lot, doing tradeshows and customer visits and dispensing Kool-Aid of various types. When he knows he is going to have to do some heavy lifting with PowerPoint he is sure to take a laptop running AnyConnect, a secure VPN client that works with the Cisco ASA firewall back at HQ to give secure, encrypted remote access. Even if he is in a coffee shop using public Wi-Fi, he knows that his data is safe because everything is going back through that encrypted tunnel. But it is more than just connectivity that we are talking about here because traffic goes through a Cisco Ironport web security appliance, filtering spyware, trojans and the like. And, just like when he is in the office, TrustSec ensures that he has access to what he needs and can’t touch the things he doesn’t. Security is deeply integrated into the network itself, not just an afterthought or add-on appliance.