Technology is important to children in terms of how they learn and how they live. A challenge for many school districts is the ability to offer a mobile learning by putting digital resources in a student’s hands with constrained funding for education.
Katy Independent School District located in Katy TX needed a wireless infrastructure that would support this vision. With over 62,000 students, Katy ISD needed to move from a wireless network that was built for coverage to a network that is built for density. By providing 802.11ac-based Wi-Fi access points in classrooms and outdoor locations and centralized management, the school district is supporting more than 40,000 concurrent Wi-Fi users and empowering faculty, students and staff. Read More »
Tags: 802.11ac, Aironet Access Points, byod, Cisco Mobility, Cisco Unified Access Solution, Katy Independent School Disctrict, mobile education, wi-fi
“Collaboration” usually means “people working together productively by sharing voice, video, and data”. Inside Cisco, the standard idea of Collaboration includes a lot of IT Technology, like:
- all voice-based Unified Communication (that is, all IP Telephony from hardware and software phones, and all Unity voicemail, and all Contact Centers)
- all Video conferencing (from Jabber or WebEx clients, video phones, desktop video, room TP, and immersive TP),
- all streaming video like Cisco TV (IP/TV) for large multicast events, and
- software clients like email, web sites and blog sites and document repository sites, Jabber IM, voice and video, and WebEx voice, video and data
But sometimes Collaboration means more. For example, Cisco IT likes to say that we “enable people to collaborate with any device, from anywhere, at any time” which really expands the scope of collaboration. Read More »
Tags: any device, byod, Cisco IT, cisco on cisco, coc-collaboration, collaboration, global, mobility, productivity
Cisco recently published their Annual Security Report (ASR) for 2015 and there was quite a bit of interesting information on what happened in 2014, but also trends for 2015. We saw the rise in the number of highly publicized attacks in 2014 and the fact that C-Level Executives are under a lot of pressure to improve the security of their networks and protect sensitive client data. While attackers have always targeted IT users, in 2015 the trend is shifting where the primary target is to take advantage of user behaviors to breach the network. This last point is important because once the user has been compromised or their credentials have been lifted, the attacker then has access to anything important that is connected. The Cisco 2015 ASR shows that only 43% of organizations leverage identity administration and provisioning to properly secure their networks and data. This means that over half of organizations don’t know who is accessing their networks, where they’re going or coming from, or what they’re using and if it is even authorized based on business policy. As we all know, once someone unauthorized gets inside it can be challenging to track down the incursion and negate the threat.
Read More »
Tags: 2015 annual security report, bring your own device, byod, internet of things, IoT, NAC, security
As the Cisco 2015 Annual Security Report shows, current security approaches aren’t sufficient. Attackers are shifting methods and becoming more sophisticated in their approaches, users are unwittingly complicit enablers, and defenders struggle to keep up with all of these things. It is time for defenders to take a different approach to security that not only outwits attackers but also makes security a competitive advantage that enables business growth.
By taking a threat-centric and operational approach to security, organizations can reduce complexity and fragmentation, while providing superior visibility, continuous control, and advanced threat protection across the extended network and the entire attack continuum.
Using Cisco technology, this approach is enabled by broad visibility for superior intelligence across the extended network, where all the solutions a customer deploys communicate with each other. Organizations using siloed solutions will have holes in their security. Siloed solutions do not provide full protection since they do not communicate with one another, thus leaving security gaps and the inability to create actionable intelligence.
Cisco can provide a holistic solution to this problem by reducing the attack surface and extending protection across the network – before, during and after attacks.
Read More »
Tags: 2015 annual security report, Big Data, byod, Identity Services Engine, ISE, Managed Threat Defense, security
Whether you are among the 8,000 attendees participating at Cisco Live Milan in-person or among our many virtual attendees catching the live web broadcast, you’ll find lots to help you with your mobility-related projects.
Read More »
Tags: #CLEUR, 11ac, 802.11ac, byod, Cisco CMX, cisco live, innovation, meraki, Meraki Challenge, milan, Milano, mobile, mobility, technology, wi-fi, wlan, workspace