Tuesday of CiscoLive Milan (#CLEUR for the Twitter among you) the keynotes will be wall to wall Rob with Rob Lloyd at 9:30 followed by Rob Soderbery at 11:15. These should be pretty interesting and give you a good foundation to where Cisco is headed overall and specifically in our core networking.
Opening Keynote with Rob Lloyd,President of Development and Sales, Cisco
Tuesday, Jan 28, 9:30 – 10:45AM
Hear from Rob Lloyd on how Cisco and the ecosystem of Cisco’s partners are uniquely positioned to connect the unconnected with an open standard and an integrated architecture from the cloud to end devices. Rob will share his vision of the Internet of Everything and examine the industry trends and technologies that are making that vision a reality.
One of the interesting and challenging aspects of working in the Mobility space is the sheer pace at which the industry is moving. I’m fortunate to work with many Customers in EMEA to help support and shape their strategy towards Mobile technology. A great example of this has been the reaction to BYOD.
The influx of personal devices into the Enterprise caused by the BYOD trend poses numerous challenges to IT Departments. Understandably, initial reaction was to focus on network and device level Security.
Cisco responded by introducing a BYOD Solution to remove some of the burden from IT Departments and provide them with a central point for managing many aspects of the BYOD lifecycle: onboarding, device profiling, authentication, authorization, offboarding and self-service management.
Are you back from holiday break all refreshed and ready to embrace 2014 with confidence?
Many organizations will see new devices on their networks given the recent massive holiday gift giving. In particular, educational organizations will be morst likely to be impacted. It seems there was no new hot toy (must-have gift) noted this year because kids want electronics. A recent survey indicated that 88% of kids ages 12 to 17 said that they most wanted a gadget as a holiday gift, with the majority (69%) requesting some kind of Apple device.
Students are returning to school with their shiny new electronic mobile devices and no hesitation to access the resources at school. Educational institutions continue to strive to enable users, while minimizing potential risk, and security continues to be the top concern.
The challenge of secure mobility will persist as the device storm continues. 2014 opens with the Consumer Electronics Show in Las Vegas, January 7-10. The last couple years the show highlighted latest smart phones and tablets. It seems this year a heavy focus on the Internet of Things—with sensor-based devices that feed information to a computer over the Internet, further emphasizing the Any to Any problem, which changes the security paradigm. Any user on any device increasingly going over any type of connection, to any application, that could be running in any data center and on any cloud. Regardless of how or where our users are connecting, we have to provide the right levels of inspection and protection against malicious intruders who may steal sensitive data or disrupt business. Let’s start to think and be prepared for what organizations may see coming on their networks and what the security implications may be for next year.
Employee are now unchained from their desks; mobility frees the ability to work anyplace, anytime, and from any device. This is revolutionizing the type of productivity and efficiency businesses see from their workforce- large, medium, or small. While realizing business efficiency and growth, midmarket IT is struggling to balance objectives (make the network for you) and challenges (limited resources).
Midmarket IT Objectives
Leverage the network as a strategic asset
To increase employee productivity and gain competitive advantage;
Better serving customers,
Thus realizing overall growth
Midmarket IT Challenges with Mobility and BYOD
The advent of mobility and BYOD, while unleashing unprecedented levels of communication and collaboration, brings challenges to IT. Mobility enables BYOD. BYOD enables multiple types of employees, logging in from multiple types of devices, from multiple locations. Users are demanding access to the Internet and applications wherever and whenever they want. Chaos? Anyone reading this won’t need the laundry list of concerns. It’s there.