Summer’s coming to a close and Cisco partners have been doing much more than just hanging by the pool. They’ve been busy working on some very cool projects!
In this episode of Partner Update, we find out why Cisco partner Force 3 has been spending time with competitive eating champion Joey Chestnut and learn about a new blog series from Logicalis called Hype or Ripe.
But there’s a lot more in this action-packed newscast, so watch this week’s Partner Update to get a math lesson from Cisco Channels Chief Edison Peres, find out how architecture-based solutions can maximize ROI for customers and help ensure partner profitability, learn how Westcon Group is removing obstacles to global distribution, get the latest details from Forrester Consulting on ways that customers can benefit from Borderless Networks solutions, out with HP and in with Xerox print solutions, our VMworld update, and much more that you don’t want to miss.
Watch it all right here:
Keep reading for a list of links and a written transcript of our newscast. Read More »
Your customers want all the benefits that borderless networks have to offer; things like working from home, VPN access anywhere, and secure network access via any device. But how do you best walk customers through the costs, benefits, IT staff requirements, ROI, and the dizzying array of considerations around a sizable IT upgrade?
With a series of questions, scenarios, and analysis, the new Borderless Networks ROI Benefits Calculator is a free tool that helps partners analyze customers’ IT costs and needs—whether it’s a future network deployment or a post-deployment ROI analysis.
By plugging data into the calculator, you receive a tangible list of benefits that a customer would see from upgrading their infrastructure (like reductions in help desk costs, increases in end user productivity, or energy savings).
Cisco tapped independent technology and market research company Forrester Research to create the calculator. Forrester gathered data from its research on Cisco Borderless Networks and the market in general, interviewed Cisco marketing and sales personnel, spoke with organizations offering solutions, and conducted a survey of 121 IT network execs.
There is a lot of buzz out there right now about Telework Solutions for Government as many agencies are making the transition that so many Corporations have already completed. Personally, I haven’t worked full time in an office since pre-1996 and can’t imagine wasting that much time every day on preparations and commuting for no real purpose other than donuts, coffee and the latest office gossip.
Work is an activity, not a location in today’s professional world with pervasive networking capabilities and the Government is getting on board under the leadership of the current administration.
If you want to get a feel for the progress and momentum around this, check out the public/private partnership at the Telework Exchange site focused on eliminating the Telework Gridlock. Cisco is one of the sponsors of this activity because we see the value, have lived it for better than 15 years, and can offer solutions to help make this a reality for our Government customers. Read More »
In my last post on this topic, I highlighted just how true the words “Work is no longer a place you go, but what you do” really are. We now have the ability to work anytime, anywhere, using any device. As easy as this has made the lives of workers all over the world, it’s made the lives of security administrators immensely difficult. Providing secure access to the corporate network in a borderless world, while still somehow keeping out the bad stuff, has caused traditional security policies to become increasingly difficult to configure, manage, and troubleshoot – the source of inordinate amounts of pain for security administrators.
That’s why Cisco has introduced identity-based firewall security as a new capability of the ASA platform. As the first installation of what will soon become full context-aware security, identity-based firewall security enables security administrators to utilize the plain language names of users and groups in policy definitions. Rather than authoring and managing the growing list of IP addresses to cover every possible location, device, or protocol that may be required for secure access to the network, identity-based firewall security enables security administrators to grant access to “Jeff.” Regardless of where I am or what I’m using for access, I’m still Jeff… so in the simplest case, my administrator can literally write one policy to provide “Jeff” access to the corporate network, rather than six different IP addresses for all the instantiations of Jeff.
Popular portions of our ‘Intelligent Switches come out of the Closet” show continue to leak out on our podcast channel. In this segment we cover innovation here around TrustSec, MacSec, EnergyWise and so much more with the 3560-C and 2960-C series switches. These things pack a lot of punch into a small, very purpose built package.