Cisco Blogs


Cisco Blog > Partner

Cisco Partner Weekly Rewind – January 17, 2014

January 17, 2014 at 10:51 am PST

Partner-Weekly-Rewind-v2Each week, we’ll highlight the most important Cisco partner news and stories, as well as point you to important, Cisco-related partner content you may have missed along the way. Here’s what you might have missed this week:

Off the Top

While it may not have been one of our own Channels Blogs, John Monaghan posted a great blog today on what’s up next for BYOD.

The BYOD influx of personal devices into the Enterprise causes IT departments numerous challenges. John takes a look at the Cisco BYOD solution and mobile device management (MDM) and how the two must co-exist. It’s a good forecast at where the segment is going and definitely worth a look, especially with the new marketing plays for Cisco BYOD and Connect to the Cloud II. Read More »

Tags: , , , ,

Going to Cisco Live Milan? Two keynotes to check out!

heads-lloyd

Tuesday of CiscoLive Milan (#CLEUR for the Twitter among you) the keynotes will be wall to wall Rob with Rob Lloyd at 9:30 followed by Rob Soderbery at 11:15.  These should be pretty interesting and give you a good foundation to where Cisco is headed overall and specifically in our core networking.

Opening Keynote with Rob Lloyd,President of Development and Sales, Cisco

Tuesday, Jan 28, 9:30 – 10:45AM

Hear from Rob Lloyd on how Cisco and the ecosystem of Cisco’s partners are uniquely positioned to connect the unconnected with an open standard and an integrated architecture from the cloud to end devices. Rob will share his vision of the Internet of Everything and examine the industry trends and technologies that are making that vision a reality.

  Read More »

Tags: , , , , , ,

What Next for BYOD?

One of the interesting and challenging aspects of working in the Mobility space is the sheer pace at which the industry is moving.  I’m fortunate to work with many Customers in EMEA to help support and shape their strategy towards Mobile technology.  A great example of this has been the reaction to BYOD.

The influx of personal devices into the Enterprise caused by the BYOD trend poses numerous challenges to IT Departments.  Understandably, initial reaction was to focus on network and device level Security.

Cisco responded by introducing a BYOD Solution to remove some of the burden from IT Departments and provide them with a central point for managing many aspects of the BYOD lifecycle: onboarding, device profiling, authentication, authorization, offboarding and self-service management.

Almost at the same time, a new industry segment was created: Mobile Device Management. The intent of MDM systems is Read More »

Tags: , , , , , , , , , , , , , , , ,

2014: More Secure Access, Please

January 9, 2014 at 1:30 pm PST

Are you back from holiday break all refreshed and ready to embrace 2014 with confidence?

Many organizations will see new devices on their networks given the recent massive holiday gift giving. In particular, educational organizations will be morst likely to be impacted. It seems there was no new hot toy (must-have gift) noted this year because kids want electronics. A recent survey indicated that 88% of kids ages 12 to 17 said that they most wanted a gadget as a holiday gift, with the majority (69%) requesting some kind of Apple device.

Students are returning to school with their shiny new electronic mobile devices and no hesitation to access the resources at school. Educational institutions continue to strive to enable users, while minimizing potential risk, and security continues to be the top concern.

Secure AccessConsider this:

Secure Mobility in Higher Education

Secure Mobility in K-12 Education

The challenge of secure mobility will persist as the device storm continues. 2014 opens with the Consumer Electronics Show in Las Vegas, January 7-10. The last couple years the show highlighted latest smart phones and tablets. It seems this year a heavy focus on the Internet of Things—with sensor-based devices that feed information to a computer over the Internet, further emphasizing the Any to Any problem, which changes the security paradigm. Any user on any device increasingly going over any type of connection, to any application, that could be running in any data center and on any cloud. Regardless of how or where our users are connecting, we have to provide the right levels of inspection and protection against malicious intruders who may steal sensitive data or disrupt business. Let’s start to think and be prepared for what organizations may see coming on their networks and what the security implications may be for next year.

Happy 2014!

Tags: , , , ,

17 Signs You Could Be A CiscoChampion for Enterprise Networks

Cisco Champions CVD Beach ReadingIf you see yourself in any of the following, you might be a Cisco Champion for Enterprise Networks.

  1. You’ve named your pet cat “6k”
  2. News of a new .11ac AP excites you
  3. CVDs are beach reading
  4. You can name more than 4 services offered on an ISR
  5. You know why there aren’t IOS ver. 13 nor 14
  6. Your home network scares some visitors. Others want to borrow it for study
  7. Downgrading someone’s QoS (allegedly) is your idea of a practical joke
  8. Your CCIE number is in your twitter profile Read More »

Tags: , , , , , , , ,