Cisco Blogs


Cisco Blog > Enterprise Networks

Midsize Auctioneer’s Network is Fast and Fortified as Hundreds of Clients Bid Billions

Forget the best of both worlds. Ritchie Bros Auctioneers have found the best of three worlds with their network. This midsize company enables fast, secure bidding for customers, provides hassle-free mobile access for employees, and detailed network reports with no effort for IT.

Ritchie Bros. Auctioneers is the world’s largest auctioneer of heavy equipment and trucks. They sell billions of dollars of unused and used equipment at hundreds of unreserved public auctions each year. What’s even more impressive is that they are able to do this with only 1300 employees worldwide.

Auctions are very time sensitive and require a synchronized effort. This leaves little room for errors and interruptions.  Read More »

Tags: , , , , , , , , , , , , , , , , , , , , ,

Secure Access for the Real World, Really?

February 20, 2014 at 6:00 am PST

Yes, really. I just got back from Cisco Live! Milan where Chris Young, Senior VP at Cisco, spoke to the Cisco security story, Intelligent Cybersecurity for the Real World. The Cisco security strategy addresses many security challenges across a range of attack vectors (network, endpoint, mobile devices, cloud, or virtual). It covers the entire attack continuum with point-time solutions and dynamic analysis of real-time security intelligence. This reduces the security gaps and minimizes the complexity. Not many network providers or pure security players can make this claim. Ask your secure access provider, how do you address the access to the broad range of threat vectors? And when a threat comes in how do you manage it? Read More »

Tags: , , , , ,

Access Control with Cisco TrustSec: Moving from “IP Addresses” to “Roles and Attributes”

Today’s enterprise is a highly dynamic, and hyper connected environment where IT plays a critical role in connecting the users, devices, resources and corporate IT systems. Today’s employees are also highly mobile in nature and do not necessarily have a single workspace assignment. The IT departments are constantly being challenged by the organization’s Line of Business owners to keep up with the pace of rolling out new services to address market needs, while keeping up with user expectations.

At the same time, IT departments also are responsible for ensuring business continuity and an uninterrupted service. However, the toughest challenge that any IT organization faces is implementing a security architecture which not only satisfies the compliance and industry regulatory requirements, but also provides a sufficient amount of protection against unauthorized access, data breaches, etc.

The traditional way to implement a security architecture in this kind of an environment is by implementing security rules in Firewall for traffic traversing the network’s extranet/intranet or data-center perimeters. For implementing security policies within an organizations network, Identity-Based Networking using IEEE 802.1X is generally used. Read More »

Tags: , , , , , , , , , , , ,

Educause: Bringing Together Technology and Education to Invest in Our Future

It’s amazing to think about the way a traditional classroom operated only a few years ago.  As Renee Patton recently pointed out in her blog post, there were rules, there were barriers, and they were all kept within the confines of an educational institution.  As technology has advanced, those rules have been challenged, barriers overcome, and an entirely new era of learning has emerged.

The collaborative nature of education, educators and learners has allowed new technologies to thrive and innovation to accelerate.  We’re flipping classrooms, implementing mobile learning programs and developing entirely new ways for students to connect and engage.  And we’re looking with excitement toward a future that will continually change the way we teach and learn. Read More »

Tags: , , , , , , , , , , , ,

Have You Registered for the April 17th One Network Deep Dive?

Activate the IT Transformation with Cisco Unified Access” Webinar Series: Part II Network Deep Dive, April 17

Wired and Wireless

In just two days, Wednesday April 17, we will have the 2nd live broadcast of the Cisco Unified Access webinar series. We will have excellent technical content to dig deeper into the subject of “One Network”, specifically converged wired and wireless access (CLICK HERE TO REGISTER). Read More »

Tags: , , , , , , , , , , , , , , , ,