If you attended the Cisco Power of Participation virtual event yesterday, you probably noticed the tremendous amount of announcements around new products, solutions and technologies for both the data center and Cisco Borderless Networks. Now that the dust has settled, I thought it would be a good time to go through some of those announcements, highlight what I think is important, and point you to where you can get more information.
One of the key announcements in the launch was Application Velocity, a new network service for providing application performance, visibility, control and survivability – especially for remote connections to branch offices or cloud-based services. There are a lot of different technologies that fall under that umbrella, but I wanted to highlight three:
Today’s Power of Participation launch delivers new innovations in Borderless Networks for video, energy management, security, and mobility.
Yes, that’s right! Cisco is introducing new products and services across all the functional elements of its Borderless Network Architecture—routing, switching, wireless, and security portfolios. Notable additions include our highest-performing Adaptive Security Appliance firewall, Catalyst switch, and compact ASR 1000 router in their classes, new entry-level 802.11n wireless access points for smaller businesses, and offerings that accelerate application performance physically and virtually across networks.
Of course, as channel partners, you may be wondering, how can you take advantage of these new offerings? Watch our video with Wenceslao Lada (VP Partner Sales and Practice Management, Borderless Networks) as he explains the news and what it means for partners.
You’ve heard Cisco talk about borderless networking and mobility, and you’ve probably nodded your head, thinking, “Yeah, I know. I get that.” People connecting to a network to access applications and information with various devices from various locations at various times. Cisco, you’re preaching to the choir. Because for many employees at companies around the world, it’s a fact of life. For most it’s an expectation. And for those who are always on the go, it’s a demand.
However, for businesses and their IT departments, supporting a distributed workforce is a challenge. Where the user goes, the network goes. And where the network goes, corporate information goes. Instead of trying to stop an immovable force, Cisco is trying to usher it in for its customers with as much ingenuity and innovation as possible. Imagine if the network could help desktop virtualization technology handle more than just emails or data – a limitation that has hindered its adoption – and deliver rich media and video to thin clients, fat clients and everything in between. Imagine if a network could be so smart that before delivering information from a data center to a user it could factor in a person’s identity, job function, device, and physical location to determine if it was appropriate and safe? A salesperson accessing a sales spreadsheet? Are you in the office? Yes? Here you go. Happy selling. Oh wait – Are you at a coffee shop with your laptop open for all to see? Are you connecting via satellite on a plane? Sorry, but you have to wait before you get that document. Too many people can see it from where you’re sitting. In other words, imagine if the network could manage information access and delivery with such intelligence that it helped mitigate security threats and risks.
Few aspects of networking have experienced as much change in recent years as the network firewall. Once considered a desktop security device, then embraced as the cadre of gateway security for businesses of all sizes, the firewall has lost its “place”. Don’t get me wrong, I’m not belittling the importance of the network firewall – in fact, my intention is quite the opposite!
Today Cisco made an announcement that supports the notion that the network firewall is more important than ever. But where does it belong? Marketers and IT professionals, alike, are all guilty of using the silly “brick wall” graphic in all our presentations. I’ve done it myself more times than I can count – right there, between the network edge and the DMZ. After all, that’s where it has traditionally lived, right?
The problem is that with the advent of cloud computing, virtualization, and the ability to gain anytime/anywhere access to data from a wide range of devices, it’s hard to tell where the network begins and where it ends these days. And if we can’t find the network edge, where do we place the firewall? How do we protect our network assets from the deluge of Internet-borne threats? Read More »