Cisco Blogs


Cisco Blog > Enterprise Networks

Enterprise Networks Taking Center Stage at Cisco Live Milan

It is clear being an IT professional today is not easy, there are ever increasing demands on the network and on IT resources. Just look at some of the data out there:

Even in conversations with customers here at Cisco Live MilanCL Milan it is evident that IT is tasked to more with less, “I am told I need to be more agile.” Or, “Everyone is getting new Mobile Devices that are going to increase traffic.” Or “I needs to be more strategic to the business.”

It is clear that IT needs to rethink how they enable applications, secure the network and manage the infrastructure. But there is hope! Cisco is hard at work developing new solutions and products to help in meeting top of mind concerns. In recent January announcements, many being highlighted at Cisco Live Milan, Cisco has shown how new technology can help IT be more agile, support new demands and drive business impact. There have been a number of blogs talking about these announcements and below is where you can find out more about these exciting Cisco innovations.

Increasing IT Agility

  • Cisco ONE Delivers a More Valuable and Flexible way to Consume Cisco Software.
  • Cisco Meraki is delivering a global, enterprise-class, comprehensive Cloud-Managed IT solution

Supporting New Demands

Driving Business Impact

Tags: , , , ,

Prepare for Data Breaches! They Will Happen … to Anyone

Do you feel that you’ve been hearing a lot about data breaches lately? You are right! Take a look at the chart below. There is plenty of time left in September, but the data breach calendar is already filled with victim names. And August? I don’t even have enough space to put down all the victim names.

If anyone believes that if we do a great job, we can fully guard our data and valuable information assets against attacks and breaches, now it’s time to think again. The reality is, data breaches can happen to anyone. They are happening everywhere from household names, to lesser-known businesses or organizations, and  to the mighty government of the United States. The question is no longer “if”, it is “when”.

However, this does not mean that we will just give up. On the contrary, we need new thinking. And get prepared. We need to be prepared before breaches take place to minimize their chances to succeed. We need to be prepared during breaches to detect and stop them. And we need to be prepared to rapidly apply mitigations after breaches. We cannot totally eliminate these risks, but we can control and minimize them. Read More »

Tags: , , ,

Back By Popular Demand – Learning Opportunity on Catalyst 3650

AN94721_240x200A few months ago we had a webcast on the Catalyst 3650 and it was so popular, there were so many questions, we thought we’d host another one! This webcast is being held on August 19th at 10am PT and you can register here!  

Topics to be discussed include:

  • Top of mind IT issues
  • The Catalyst 3650 Series Switch features & innovations
  • Model selection recommendations
  • Campus and branch office deployment considerations
  • Live Q&A

Why should you attend?

Managing your network today has become more complicated than ever. In addition to the challenges of supporting an increasingly mobile workforce and a plethora of BYOD users, you are being asked to reduce IT complexity and cost and strengthen security.

Read More »

Tags: , , , , , , , ,

Securing Your Network Before BYOD or IoT

If you’re a network engineer or have been following some of the recent trends in network security space, you may have come across terms such as “erosion of trust”, “zero trust ecosystem”, “the increased attack surface” and “new attack vectors”. What this means for a network engineer is that as application migrate from on-prem to cloud, and trends like mobility and IoT vastly expand the scale of assets and forms of access to be secured, traditional network security, which historically was centered around securing the perimeter of your network, is no longer sufficient.

Anatomy of Data Breach

I was recently reading the Symantec Internet Security Report. This report has been quite appropriately themed as “2013: Year of the Mega-Breach”. In particular, the Point-of-Sale type of attack, mostly prevalent in the retail segment of the market, is a great indicator of the anatomy of a typical breach. So I’ll use that as an illustrative example for the purposes of this post.

Read More »

Tags: , , , , ,

The Network After 25 Years of Cisco Live!

#clus1A lot can change in 25 years. At the first Cisco Live (then known as Networkers conferences) in 1989, 200 geeks gathered for the inaugural event. Fast forward to three weeks ago, when we welcomed a whopping 25,000 attendees into the arms of our namesake, beautiful San Francisco.

We heard there was some interest in how the network performed at the show, so I wanted to share some of the interesting statistics about the network at Cisco Live! I shudder at the thought of the ancient network from 25 years ago. So here we go:

Wi-Fi Client Devices

This year we saw 30,705 unique devices, with 7000 in the theater for John Chambers’ keynote.

# of Unique Clients

# of Sessions

# of Unique Users

# of Unique APs

Avg Users per AP

30705

1396239

30705

859

33.64

Max. Concurrent Connected Wi-Fi Devices

There was a peak of 14216 concurrently connected device at SF this year.

clients2 Read More »

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,