Cisco Blogs


Cisco Blog > Enterprise Networks

Going to Cisco Live Milan? Two keynotes to check out!

heads-lloyd

Tuesday of CiscoLive Milan (#CLEUR for the Twitter among you) the keynotes will be wall to wall Rob with Rob Lloyd at 9:30 followed by Rob Soderbery at 11:15.  These should be pretty interesting and give you a good foundation to where Cisco is headed overall and specifically in our core networking.

Opening Keynote with Rob Lloyd,President of Development and Sales, Cisco

Tuesday, Jan 28, 9:30 – 10:45AM

Hear from Rob Lloyd on how Cisco and the ecosystem of Cisco’s partners are uniquely positioned to connect the unconnected with an open standard and an integrated architecture from the cloud to end devices. Rob will share his vision of the Internet of Everything and examine the industry trends and technologies that are making that vision a reality.

  Read More »

Tags: , , , , , ,

What Next for BYOD?

One of the interesting and challenging aspects of working in the Mobility space is the sheer pace at which the industry is moving.  I’m fortunate to work with many Customers in EMEA to help support and shape their strategy towards Mobile technology.  A great example of this has been the reaction to BYOD.

The influx of personal devices into the Enterprise caused by the BYOD trend poses numerous challenges to IT Departments.  Understandably, initial reaction was to focus on network and device level Security.

Cisco responded by introducing a BYOD Solution to remove some of the burden from IT Departments and provide them with a central point for managing many aspects of the BYOD lifecycle: onboarding, device profiling, authentication, authorization, offboarding and self-service management.

Almost at the same time, a new industry segment was created: Mobile Device Management. The intent of MDM systems is Read More »

Tags: , , , , , , , , , , , , , , , ,

2014: More Secure Access, Please

January 9, 2014 at 1:30 pm PST

Are you back from holiday break all refreshed and ready to embrace 2014 with confidence?

Many organizations will see new devices on their networks given the recent massive holiday gift giving. In particular, educational organizations will be morst likely to be impacted. It seems there was no new hot toy (must-have gift) noted this year because kids want electronics. A recent survey indicated that 88% of kids ages 12 to 17 said that they most wanted a gadget as a holiday gift, with the majority (69%) requesting some kind of Apple device.

Students are returning to school with their shiny new electronic mobile devices and no hesitation to access the resources at school. Educational institutions continue to strive to enable users, while minimizing potential risk, and security continues to be the top concern.

Secure AccessConsider this:

Secure Mobility in Higher Education

Secure Mobility in K-12 Education

The challenge of secure mobility will persist as the device storm continues. 2014 opens with the Consumer Electronics Show in Las Vegas, January 7-10. The last couple years the show highlighted latest smart phones and tablets. It seems this year a heavy focus on the Internet of Things—with sensor-based devices that feed information to a computer over the Internet, further emphasizing the Any to Any problem, which changes the security paradigm. Any user on any device increasingly going over any type of connection, to any application, that could be running in any data center and on any cloud. Regardless of how or where our users are connecting, we have to provide the right levels of inspection and protection against malicious intruders who may steal sensitive data or disrupt business. Let’s start to think and be prepared for what organizations may see coming on their networks and what the security implications may be for next year.

Happy 2014!

Tags: , , , ,

17 Signs You Could Be A CiscoChampion for Enterprise Networks

Cisco Champions CVD Beach ReadingIf you see yourself in any of the following, you might be a Cisco Champion for Enterprise Networks.

  1. You’ve named your pet cat “6k”
  2. News of a new .11ac AP excites you
  3. CVDs are beach reading
  4. You can name more than 4 services offered on an ISR
  5. You know why there aren’t IOS ver. 13 nor 14
  6. Your home network scares some visitors. Others want to borrow it for study
  7. Downgrading someone’s QoS (allegedly) is your idea of a practical joke
  8. Your CCIE number is in your twitter profile Read More »

Tags: , , , , , , , ,

Mobility and BYOD That’s Right for Your Midsize IT

Employee are now unchained from their desks; mobility frees the ability to work anyplace, anytime, and from any device. This is revolutionizing the type of productivity and efficiency businesses see from their workforce- large, medium, or small.  While realizing business efficiency and growth, midmarket IT is struggling to balance objectives (make the network for you) and challenges (limited resources).

Midmarket IT Objectives

Leverage the network as a strategic asset

To increase employee productivity and gain competitive advantage;

Better serving customers,

Thus realizing overall growth

Midmarket IT Challenges with Mobility and BYOD

The advent of mobility and BYOD, while unleashing unprecedented levels of communication and collaboration, brings challenges to IT. Mobility enables BYOD. BYOD enables multiple types of employees, logging in from multiple types of devices, from multiple locations. Users are demanding access to the Internet and applications wherever and whenever they want.  Chaos? Anyone reading this won’t need the laundry list of concerns. It’s there.

Read More »

Tags: , , , , , , , , , ,