Cisco Blogs


Cisco Blog > Enterprise Networks

How to Make the Invisible Visible: An Automated Answer for Network Transparency

Let’s face it. Danger lurks inside every enterprise network, and when it hits, addressing the crisis with manual processes that are inefficient and error-prone can take days – or even weeks – to resolve. If you’ve ever been in a situation like this, minutes can seem like hours. You’re aware that not only is fast problem resolution critical, but that the displaced effort and incremental time incurred by you or your staff in resolving the issue is detrimental as well. Crisis preparation can help. But fire drills often don’t compare to the real thing. To avoid constantly reacting to problems, many enterprises are harnessing automation to gain greater visibility into their network infrastructure to proactively manage and defeat danger before it occurs.

What you don’t know can hurt you

Read More »

Tags: , , , , ,

Simpler IT Management Increases the Effectiveness of Advanced Technologies

Advanced technology assists your business on its journey to becoming more efficient and agile so it can keep serving the rising expectations of customers.  But, how can you help these advanced technologies serve your business well?

Technology headlines focus on the individual tools to help you support advanced technologies; but the pivotal reality is that the foundation for all such technologies is your data center infrastructure.  If your infrastructure cannot meet the speed and flexibility needs of these new technologies, they won’t help your business become more efficient or agile.

The good news is that Cisco has made automating your infrastructure straight forward with Cisco UCS Director.  This solution replaces manual tools and processes with automated workflows to deliver infrastructure resources within minutes.  It reduces data center operational complexity across Cisco and multi-vendor infrastructure components.

Need proof?

Read More »

Tags: , , , ,

On-Demand Private Cloud: How to Cut CapEx, Free Up Resources, and Boost Business Agility

Today, enterprises need greater business agility and faster time-to-market for applications. That’s why, in many instances, they are building their own private clouds or adopting on-demand private cloud. Companies that are most suited to building their own private clouds are those that have deep engineering and IT leadership and need strong security and governance around applications and services.

Depending on the needs of the business and core competencies, other types of companies can benefit from a managed private cloud. For these companies, it’s not core to the business to be great at infrastructure, but it is crucial to be able to focus on the services offered on top of the infrastructure. These types of organizations may not have strict regulatory or data sovereignty requirements. Typically, they gain the most advantage from using managed private clouds.

Read More »

Tags: , , , , , , , ,

Cisco ONE Software Makes it Easy to Start Automating

Companies’ expectations of IT keep increasing as the pace of business intensifies, creating greater demand for new services and faster access to resources and data.  If you have been reading my blogs, you know that THE way for IT to keep pace with the speed of business is automation. But buyers beware.

IT automation solutions are difficult to create with multiple products that carry a la carte pricing models and licensing models tied to hardware. The hassles are obvious, and that model doesn’t help IT automate effectively. What is necessary is full functionality automation software that offers simplified pricing and licensing options as well as unified automation that delivers broad coverage for diverse environments. So Cisco offers exactly that.  Watch this video to learn how.

 

Peter VOD1

Cisco ONE Software for Data Center makes it easy to automate at a pace comfortable to your business.   The Cisco ONE Foundation Suite lets you master basic automation at the compute level. Read More »

Tags: , , , , , ,

The Seven Wonders of User Access Control: Part II

In the first of a two-part blog series, The Seven Deadly Sins of User Access Controls, my colleague Jean Gordon Kocienda provided fresh insights into overly-permissive user access controls as a common underlying cause of data breaches. In this blog, I address the solutions to those “Seven Deadly Sins” with a modern twist on the antiquity typically known as the “Seven Wonders.”

Information Security professionals need to address user access control in the context of today’s complex threats, coupled with a fast changing IT landscape. Long gone are the days of only a few with a need to know and key corporate assets being housed behind the enterprise perimeter. We have shifted to an agile, data-centric environment with increasing user populations who may also be third-party suppliers or contractors needing fast access to assets that were previously off limits. And, it’s not just massive volumes of data that need protecting; it’s access to critical work streams and transactions too.

Read More »

Tags: , , , ,