Cisco Blogs


Cisco Blog > The Platform

Borderless Networks Opportunities For Cisco Partners

Forrester Research calculated a three-year, risk-adjusted ROI of 121 percent, with a payback period of less than six months, for customers who implemented Cisco Borderless Networks.

Cisco Borderless Networks is a next-generation architecture that delivers the new work space experience, enabling employees, customers, and partners to access mission-critical applications with any device, anywhere, anytime—securely, reliably, transparently.  It enables organizations to easily offer different levels of access to users and devices to meet business and regulatory compliance. The Border­less Network matches the right user on the right device to the right network with the right access. Because a fast, secure, and reliable network is essential to the borderless enter­prise, the Cisco Network Optimization Service can play an important role in the Border­less Network architecture.

Partners: We have a services offering where you can learn how to sell it in your customer base (Cisco CCOID is required).

Read More »

Tags:

Power of Participation Launch Roundup

If you attended the Cisco Power of Participation virtual event yesterday, you probably noticed the tremendous amount of announcements around new products, solutions and technologies for both the data center and Cisco Borderless Networks. Now that the dust has settled, I thought it would be a good time to go through some of those announcements, highlight what I think is important, and point you to where you can get more information.

One of the key announcements in the launch was Application Velocity, a new network service for providing application performance, visibility, control and survivability – especially for remote connections to branch offices or cloud-based services. There are a lot of different technologies that fall under that umbrella, but I wanted to highlight three:

Read More »

Tags: , , , , , , , ,

Expanding Borderless Networks: New Routing, Switching, Security, and Mobility

October 5, 2010 at 6:00 am PST

Today’s Power of Participation launch delivers new innovations in Borderless Networks for video, energy management, security, and mobility.

Yes, that’s right! Cisco is introducing new products and services across all the functional elements of its Borderless Network Architecture—routing, switching, wireless, and security portfolios. Notable additions include our highest-performing Adaptive Security Appliance firewall, Catalyst switch, and compact ASR 1000 router in their classes, new entry-level 802.11n wireless access points for smaller businesses, and offerings that accelerate application performance physically and virtually across networks.

Of course, as channel partners, you may be wondering, how can you take advantage of these new offerings? Watch our video with Wenceslao Lada (VP Partner Sales and Practice Management, Borderless Networks) as he explains the news and what it means for partners.

Want to learn more?

Read More »

Tags: , , , , , , , , , , , , ,

The Future Network For The Future Enterprise: Imagine If

You’ve heard Cisco talk about borderless networking and mobility, and you’ve probably nodded your head, thinking, “Yeah, I know. I get that.” People connecting to a network to access applications and information with various devices from various locations at various times. Cisco, you’re preaching to the choir. Because for many employees at companies around the world, it’s a fact of life. For most it’s an expectation. And for those who are always on the go, it’s a demand.

However, for businesses and their IT departments, supporting a distributed workforce is a challenge. Where the user goes, the network goes. And where the network goes, corporate information goes. Instead of trying to stop an immovable force, Cisco is trying to usher it in for its customers with as much ingenuity and innovation as possible. Imagine if the network could help desktop virtualization technology handle more than just emails or data – a limitation that has hindered its adoption – and deliver rich media and video to thin clients, fat clients and everything in between. Imagine if a network could be so smart that before delivering information from a data center to a user it could factor in a person’s identity, job function, device, and physical location to determine if it was appropriate and safe? A salesperson accessing a sales spreadsheet? Are you in the office? Yes? Here you go. Happy selling. Oh wait – Are you at a coffee shop with your laptop open for all to see? Are you connecting via satellite on a plane? Sorry, but you have to wait before you get that document. Too many people can see it from where you’re sitting. In other words, imagine if the network could manage information access and delivery with such intelligence that it helped mitigate security threats and risks.

Read More »

Tags: ,

Borderless Networks: Where Has the Firewall Gone?

Few aspects of networking have experienced as much change in recent years as the network firewall.  Once considered a desktop security device, then embraced as the cadre of gateway security for businesses of all sizes, the firewall has lost its “place”.   Don’t get me wrong, I’m not belittling the importance of the network firewall – in fact, my intention is quite the opposite!

Today Cisco made an announcement that supports the notion that the network firewall is more important than ever.  But where does it belong?  Marketers and IT professionals, alike, are all guilty of using the silly “brick wall” graphic in all our presentations.  I’ve done it myself more times than I can count – right there, between the network edge and the DMZ.  After all, that’s where it has traditionally lived, right?

The problem is that with the advent of cloud computing, virtualization, and the ability to gain anytime/anywhere access to data from a wide range of devices, it’s hard to tell where the network begins and where it ends these days.  And if we can’t find the network edge, where do we place the firewall?  How do we protect our network assets from the deluge of Internet-borne threats? Read More »

Tags: , ,