Cisco Blogs


Cisco Blog > Inside Cisco IT

How Cisco IT Plans Capacity for Wireless LAN Access

Brett_Belding

 

Brett Belding

The capacity requirements for Cisco WLANs have held steady over the last decade—until now. The big change is more devices and more video use:  Read More »

Tags: , , , , , , , , ,

Addressing Cyber-Security Challenges of Today and Tomorrow

Did you know that Cisco detects over 1.5 million intrusion attempts on Cisco’s network every day? With more than 13 billion NetFlow records captured daily, over 22 Terabytes of traffic inspected, and 750 Gigabyte of system logs collected on a daily basis, it’s changing the landscape for how to secure intellectual property, confidential information, and mitigate malicious attacks.

This brief video shares relevant security information, real-world experiences to help educate customers on security threats, and technology solutions deployed to secure Cisco’s intellectual property.

Tags: , , , , ,

How Is Cisco IT Benefiting from Application Centric Infrastructure?

Cisco IT has already started reaping the benefits of Application Centric Infrastructure (ACI) from our early internal deployments. Cost savings rank high, in decreased operating expenditures through automation enabled by ACI and the sharp reduction of manual processes that introduce human errors and operational risk.   Read More »

Tags: , , , , , , ,

How Cisco is Using Platform as a Service (PaaS) delivery and ACI

The role of IT in the enterprise is transforming. Cisco is creating the next-generation data center and cloud deployments with Application Centric Infrastructure (ACI) to simplify and optimize the entire application deployment lifecycle.  Read More »

Tags: , , , , , , , ,

The Evolution of Guest Networking

As I’ve described in my previous blogs and documents, the first capability deployed by Cisco IT for Identity Services Engine (ISE) is guest networking. Guest networking replaced an older existing solution, referred to internally as NextGen Guest Networking (NGGN). NGGN relied on about 12 servers globally and had a large access control list (ACL) to manage. Deploying guest networking on ISE is a logical first choice for three reasons:  Read More »

Tags: , , , , , , ,