The 2012 London summer Olympic games are now in the books. I’m sure that a lot of you watched as many events as you could. As thousands of world-class Olympians met and competed, they left us with not only their brilliant performances but also many inspirational stories.
Almost everyone is familiar with South Africa’s double amputee “Blade Runner” Oscar Pistorius. There’s also Bryshon Nellum, the American track and field athlete, who brought us another amazing story. In 2008, he was shot three times with major damage to his legs and hamstrings. Against all odds, he trained through the pain and recovered his speed. In London, he ran the first leg of the US men’s 4x400 relay team and they won the silver medal.
As service providers move to cloud-based services, their IP addressing management system must operate efficiently in the virtualized environment of the cloud. And within the cloud environment, these systems for DHCP, DNS and IP address management must also be fast. For example, many organizations have expressed a concern that poor DHCP performance could be the weak link when thousands of customers come back online after a failure event. If DHCP address requests are handled in a slow or scattered manner, servers will not be able to service all requests in a timely fashion.
Another requirement for IP address management systems is support for IPv6, as the depletion of IPv4 addresses has led to many organizations finding themselves facing a rather accelerated and mandatory migration to IPv6 (read: yesterday’s World IPv6 Launch). While one of IPv6’s promises was the elimination of the need for DHCP, the reality is that centralized network management has made DHCPv6 a necessity. DHCP allows network devices to Read More »
Having a lot of fun this year at Interop 2012. We are shooting and editing in a much tighter workflow so that we can publish these things same day and thank gosh! The stories are numerous and oh so timely. Follow along as I attempt to recap our first full day on the show floor.
As he describes it: Cisco has developed and introduced Prime Assurance Manager with one essential goal in mind – to provide end-to-end operational monitoring visibility, spanning data center to and through the branch, as a means for facilitating efficient operations and proactively protecting network-delivered applications and network availability, network performance, application performance, and end user experience data across both wired and wireless environments, coupled with troubleshooting and reporting features.
As anyone who attended Cisco’s recent “BYOD without Compromise” Webinar noticed, the BYOD phenomenon is changing company priorities, and is bringing up a lot of questions about the solutions available to scale, secure and operate a successful network. Replay the Webinar
Join us for our upcoming #ciscowifi TweetChat during which you’ll be able to engage in a real time BYOD discussion on Twitter with Cisco Technical Experts. What is a TweetChat?
April 17, 10-11am PST: TweetChat Topic: BYOD and Cisco ISE – use #ciscowifi.
First, I’ve put together just a few details based on the most popular questions posed during the recent webinar about Cisco’s approach to BYOD. And at the end of this post, I’ve also listed upcoming events for even more in depth technical discussions on a variety of BYOD topics.
Enhanced Identity Services Engine (ISE):
Cisco ISE is a context-aware, identity-based platform that gathers real-time information from the network, users, and devices. This enables IT to offer mobile business freedom with policy for when, where and how users may access the network..
ISE integrates with Prime Network Control System and supports BYOD with any 11n Wireless Access Point (even if you’re running your network in FlexConnect -- aka HREAP- mode)
In addition to managing on-boarding, Cisco ISE has full guest lifecycle management. It also allows IT to deny access to devices for a variety of reasons; such as who you are, what device it is, if you are running the latest OS or anti-malware or how you are accessing the network..
Posture -- Posture is the component of ISE platform responsible for enforcement of corporate security policies governing access to its enterprise network. For example, for non-corp owned devices, you can decide what is the minimal requirements based on the device type/OS etc. Setting this up ahead of time will avoid security issues with non-supported devices
ISE also provides real-time endpoint scans based on policy to gain more relevant insight. These automated features result in a better user experience and more secure devices. Cisco ISE uniquely leverages the network. It is essentially the brains for secure access and provides the policy to the network infrastructure (it is woven into the switches, routers, etc.)
New Prime Infrastructure:
Prime is a single package that provides complete infrastructure – wired and wireless, and mobility lifecycle management– configuration, monitoring, troubleshooting, remediation, and reporting. This solution includes: Prime Network Control System (NCS) for converged wired/wireless monitoring and troubleshooting, plus wireless lifecycle management, with new branch network management functionality; and Prime LAN Management Solution, for wired lifecycle management and Borderless Network services management.
Mobile Device Management (MDM):
To protect data on mobile devices and ensure compliance, Cisco is integrating with multiple Mobile Device Management vendors. This gives IT greater visibility into the endpoint as well control over endpoint access based on the compliance of these devices to company policy (such as requiring pin lock or disallowing jailbroken devices), and the ability to do remote data wipes on lost or stolen mobile devices. If you don’t have a supported vendor, we will not be able to get as rich detail about the status of that device, however, you still get the full wired/wireless policy.
Current MDM third party vendors: Zenprise, Good, Airwatch, MobileIron
Device Operating Systems:
Wondering about which OS is preferred on your mobile device?
Cisco offers broad mobile device OS support in Cisco AnyConnect VPN software, including IOS, Android, and Windows Mobile.
When it comes to virtualization, Cisco has created the Cisco Virtualization Experience Infrastructure (VXI), an end-to-end systems approach that delivers the next generation virtual workspace by unifying virtual desktops, voice, and video. Check out the link for more information on VXI, VXI with Citrix, VXI with VMware, Virtualization Services and validated Design Guides http://www.cisco.com/web/solutions/trends/virtualization/index.html
This is just a drop in the bucket. To get even more information on taking your organization beyond BYOD, don’t miss our upcoming technical deep dive webinars and in person events that speak directly to managing your growing network while you’re doing your best with limited resources. You can also check out Cisco’s BYOD solution, Prime and ISE: