Cisco Blogs


Cisco Blog > The Platform

Mobility and Virtualization in the Next-Generation Workplace

I’m one of the lucky ones. Many of my peers work in companies that aren’t as forward looking about IT as Cisco is. Where they struggle to keep up with the demands of today’s employees, I’m fortunate to work in an environment that offers workspace flexibility and access to telepresence, web conferencing, and a social platform based largely on the employee’s choice of device.

That’s not to say that we’ve got it all figured out at Cisco. As I onboard new college graduates, I, too, find myself struggling to meet their expectations. I think we’ve entered a phase in which all business and IT leaders will lag slightly behind the workplace expectations of the new generation.

To better understand this fundamental shift, we recently commissioned Forrester Research to look specifically at mobility, virtualization, and other enterprise-level technology initiatives.  Read More »

Tags: , , , , , , , ,

The Day I Lost My Mobile with Sensitive Corporate Data

November 26, 2012 at 8:18 am PST

It was a dark, cold, and scary night when I returned from dinner with friends and noticed that my mobile phone was missing. It had corporate sensitive data such as emails, calendar events, and documents, as well as personal data (including pictures, videos and other documents). Well, let me be honest with you, I didn’t really lose my phone. However, many cell phones, tablets, and other gadgets are lost or stolen on a daily basis. The problem of stolen mobile devices is huge. According to a report from the Federal Communications Commission (FCC) earlier this year, about 40 percent of robberies in Washington, D.C., New York, and other major cities now involve mobile devices. The FCC has teamed up with the nation’s top wireless carriers, including AT&T, Verizon, T-Mobile, and Sprint, to develop a database of stolen mobile devices.

Allowing employees to access corporate email, critical business applications and data makes workers more productive and effective. Finding just the right balance when allowing easy access to the applications that users need to be more productive, while maintaining the integrity and security of enterprise resources, will give your organization a competitive advantage.

Stolen and lost devices are among the many challenges of mobile device security.

Read More »

Tags: , , , , ,

Protect Data Centers with Cisco IPS: TechWiseTV Webinar

Data Centers are going through a rapid evolution due to industry trends of virtualization, cloud computing and bring your own device (BYOD) initiatives, putting an even greater strain on IT resources to secure the data, applications and access critical to the success of the business. Today’s data center must be secure and resilient to keep the enterprise running at maximum productivity; protecting its profitability and reputation.

The modern enterprise runs a wide array of commercial and customized applications, and the data within those applications is exactly what attackers are targeting. Those critical applications and servers within the data center continue to be the subject of targeted attacks and sophisticated malware. The 2012 Verizon Data Breach Report highlights that attacks against servers accounted for 94% of all data compromised last year. Strong security controls and visibility measures must be implemented to protect the integrity of the enterprise data center.

Click below to watch a Cisco TechwiseTV Workshop on protecting today’s data center using Cisco Intrusion Prevention Systems (IPS).

http://www.cisco.com/go/semreg/urls/105149/2/000071953

Tags: , , , , , ,

Four Initiatives to Bridge the Collaboration Adoption Gap

November 2, 2012 at 8:33 am PST

In my previous post, I mentioned that I’d briefly describe four initiatives Cisco promotes to help customers bridge the adoption gap. Most of all, adoption needs to be factored in at all phases of the plan-manage-build collaboration investment lifecycle. The biggest mistake organizations can make is to treat adoption as an afterthought or process that naturally occurs without prompting when a collaboration solution goes live.

Bridging the adoption gap begins with lowering the barriers to customer investment in collaboration-focused IT services by expanding the role of “as-a-Service” collaboration consumption models. Here, cloud computing is the enabling technology, but beyond that, Read More »

Tags: , , , , , , , , , ,

Collaboration in a Post-PC World Part Two: Architecting a Solution

In the first part of this series I introduced the people in our new “at-a-glance” graphic (see end of this blog where I’ve embedded it) and looked at their diverse roles and the challenges that posed to IT. In this wrap-up blog, I focus on Bijad, the VP of IT, his understanding of the challenges and his response.

Bijad is the man in the middle of the evolution to a post-PC world. As the range of available collaboration technologies has continued to broaden, the focus for IT has begun to swing from delivering individual best-in-class applications to an interest in an integrated collaboration experience that delivers consistent functionality across multiple devices. However, this presents both a challenge and an opportunity. From the C-level suites, he is accountable for enabling this cost-effectively while providing a combination of scale, security, and accessibility through a variety of devices and operating systems. From his customers like Doug, Lee, Sarah, and Ben who you met in my previous blog, he’s hearing increasing demands for a rich, personalized, consistent user experience that lets each of them work and collaborate their way — where, when and how they want — without limits. They want tools to help them stay more connected with their peers and other organizations.

Bijad knows that this will require more flexibility and simplicity to preserve a consistent experience and that an open, interoperable architecture is key to success. Even more important, he knows that people, not technology, are the prime source of his company’s competitive differentiation. So he’s listening carefully, and thinking in terms of roles rather than devices.

To support Doug, the VP of sales, and people in similar highly-mobile, outward-oriented roles, Bijad is looking to Read More »

Tags: , , , , , , ,