Cisco Blogs

Cisco Blog > Enterprise Networks

Scan. Analyze. Improve! Introducing Switching and Wireless Best Practices on Cisco Active Advisor

In a recent post, we discussed Dimension Data’s 6th Network Barometer Report and its recommendations. Detailed in this exhaustive report, Dimension Data has found that 32% – about 1/3 – of all Service incidents are related to Human Error*. (* 6% Configuration Errors and 26% Other human errors)

We’re all human and we all make mistakes – that’s the way we learn.  However, in this era of constant connectivity, with mobility and the Internet of Everything growing rapidly, there is an ever-increasing demand on your network to perform, be available and stay secure.  Incidents of IT failure are becoming more and more costly, not only from an operational aspect, but even more so from the loss of uptime, data and customer satisfaction.  What if you could have 33% less service incidents, while using 32% less resources, keeping your network as stable as ever?  That’s where Cisco Active Advisor can help you!

It’s no secret that Cisco Active Advisor is a huge time saver – Cisco Active Advisor is a free cloud-based service that automatically discovers Cisco Enterprise Networking products with no hardware or software installation, and can not only keep you up-to-date on important lifecycle milestones, but also analyze your network health and offer recommendations for improvement.

Cisco has compiled a set of Best Practices Designs, based on experience gained from multiple TAC and escalation cases, engineering testing and customer interviews, into a set of recommendations that can improve reliability, availability and performance of your network. Read More »

Tags: , , , , ,

Enterprise Networks Taking Center Stage at Cisco Live Milan

It is clear being an IT professional today is not easy, there are ever increasing demands on the network and on IT resources. Just look at some of the data out there:

Even in conversations with customers here at Cisco Live MilanCL Milan it is evident that IT is tasked to more with less, “I am told I need to be more agile.” Or, “Everyone is getting new Mobile Devices that are going to increase traffic.” Or “I needs to be more strategic to the business.”

It is clear that IT needs to rethink how they enable applications, secure the network and manage the infrastructure. But there is hope! Cisco is hard at work developing new solutions and products to help in meeting top of mind concerns. In recent January announcements, many being highlighted at Cisco Live Milan, Cisco has shown how new technology can help IT be more agile, support new demands and drive business impact. There have been a number of blogs talking about these announcements and below is where you can find out more about these exciting Cisco innovations.

Increasing IT Agility

  • Cisco ONE Delivers a More Valuable and Flexible way to Consume Cisco Software.
  • Cisco Meraki is delivering a global, enterprise-class, comprehensive Cloud-Managed IT solution

Supporting New Demands

Driving Business Impact

Tags: , , , ,

Prepare for Data Breaches! They Will Happen … to Anyone

Do you feel that you’ve been hearing a lot about data breaches lately? You are right! Take a look at the chart below. There is plenty of time left in September, but the data breach calendar is already filled with victim names. And August? I don’t even have enough space to put down all the victim names.

If anyone believes that if we do a great job, we can fully guard our data and valuable information assets against attacks and breaches, now it’s time to think again. The reality is, data breaches can happen to anyone. They are happening everywhere from household names, to lesser-known businesses or organizations, and  to the mighty government of the United States. The question is no longer “if”, it is “when”.

However, this does not mean that we will just give up. On the contrary, we need new thinking. And get prepared. We need to be prepared before breaches take place to minimize their chances to succeed. We need to be prepared during breaches to detect and stop them. And we need to be prepared to rapidly apply mitigations after breaches. We cannot totally eliminate these risks, but we can control and minimize them. Read More »

Tags: , , ,

Back By Popular Demand – Learning Opportunity on Catalyst 3650

AN94721_240x200A few months ago we had a webcast on the Catalyst 3650 and it was so popular, there were so many questions, we thought we’d host another one! This webcast is being held on August 19th at 10am PT and you can register here!  

Topics to be discussed include:

  • Top of mind IT issues
  • The Catalyst 3650 Series Switch features & innovations
  • Model selection recommendations
  • Campus and branch office deployment considerations
  • Live Q&A

Why should you attend?

Managing your network today has become more complicated than ever. In addition to the challenges of supporting an increasingly mobile workforce and a plethora of BYOD users, you are being asked to reduce IT complexity and cost and strengthen security.

Read More »

Tags: , , , , , , , ,

Securing Your Network Before BYOD or IoT

If you’re a network engineer or have been following some of the recent trends in network security space, you may have come across terms such as “erosion of trust”, “zero trust ecosystem”, “the increased attack surface” and “new attack vectors”. What this means for a network engineer is that as application migrate from on-prem to cloud, and trends like mobility and IoT vastly expand the scale of assets and forms of access to be secured, traditional network security, which historically was centered around securing the perimeter of your network, is no longer sufficient.

Anatomy of Data Breach

I was recently reading the Symantec Internet Security Report. This report has been quite appropriately themed as “2013: Year of the Mega-Breach”. In particular, the Point-of-Sale type of attack, mostly prevalent in the retail segment of the market, is a great indicator of the anatomy of a typical breach. So I’ll use that as an illustrative example for the purposes of this post.

Read More »

Tags: , , , , ,