Today’s enterprise is a highly dynamic, and hyper connected environment where IT plays a critical role in connecting the users, devices, resources and corporate IT systems. Today’s employees are also highly mobile in nature and do not necessarily have a single workspace assignment. The IT departments are constantly being challenged by the organization’s Line of Business owners to keep up with the pace of rolling out new services to address market needs, while keeping up with user expectations.
At the same time, IT departments also are responsible for ensuring business continuity and an uninterrupted service. However, the toughest challenge that any IT organization faces is implementing a security architecture which not only satisfies the compliance and industry regulatory requirements, but also provides a sufficient amount of protection against unauthorized access, data breaches, etc.
The traditional way to implement a security architecture in this kind of an environment is by implementing security rules in Firewall for traffic traversing the network’s extranet/intranet or data-center perimeters. For implementing security policies within an organizations network, Identity-Based Networking using IEEE 802.1X is generally used. Read More »
Hi Everyone! My trusty film crew and I are here at CiscoLive! Orlando. It has been great so far with the launch of the new Cisco Catalyst 6800 Series, Cisco 4451-X, Cisco ASR 1000-AX, and Sup8E for the Catalyst 4500! Over the next few days we’ll be doing interviews with some of the awesome people here at Cisco who helped create these technologies, as well as other people doing interesting demos, and some with unique perspectives.
To kick things off, we get a little sittly with the 6800 and I got an interview with Shawn Wargo on what’s exciting about Instant Access. Enjoy and let me know what you think.
In my previous blog, we looked at how Catalyst switches can be used to assess video application readiness in the network before rolling out a video based collaboration application. In this blog, let us take a look at available tools on the Catalyst switches to monitor and troubleshoot video problems in the network.
As we know, fundamentally, video traffic is different from data traffic. Video traffic is more dynamic and bandwidth intensive and even small changes in delay or loss can cause visible disruptions to user experience. Routinely, IT trouble tickets are opened by users that are faced with degraded video experience. To add to that, interactive video is real time. Any delay in troubleshooting will make IT miss the window to rectify the problem. For a firm with many locations and buildings, finding the problem can be complex and time consuming without the right tools.