Cisco Blogs


Cisco Blog > Enterprise Networks

Cisco Converged Access Boosts Productivity At RSA

The RSA Insurance Group is a British multinational general insurance company headquartered in London, United Kingdom, operating in more than 140 countries and reaching more than 17 million customers.

Faced with challenges spurred by new trends in their work environment such as BYOD, more geographically dispersed teams and move to the cloud, RSA is using Cisco Unified Access to collaborate better, be more productive and reduce costs. RSA uses Catalyst 3850 Converged Access to truly integrate wired and wireless networks, Cisco Identity Services Engine to uniformly apply policies, and Cisco Prime to manage devices, users and resources in their network. Talking about the benefits of using Converged Access on Catalyst 3850 switches, James Sandell, Group IT Delivery Director at RSA, says “People can only work flexibly with real time presence because the underpinning wifi is rock solid, fast and its seamless to join. We use Cisco Catalyst 3850 switches with IOS XE software and integrated wireless controller and it provides One network, one management and one policy”.
Read More »

Tags: , , , , , , , ,

Midsize Auctioneer’s Network is Fast and Fortified as Hundreds of Clients Bid Billions

Forget the best of both worlds. Ritchie Bros Auctioneers have found the best of three worlds with their network. This midsize company enables fast, secure bidding for customers, provides hassle-free mobile access for employees, and detailed network reports with no effort for IT.

Ritchie Bros. Auctioneers is the world’s largest auctioneer of heavy equipment and trucks. They sell billions of dollars of unused and used equipment at hundreds of unreserved public auctions each year. What’s even more impressive is that they are able to do this with only 1300 employees worldwide.

Auctions are very time sensitive and require a synchronized effort. This leaves little room for errors and interruptions.  Read More »

Tags: , , , , , , , , , , , , , , , , , , , , ,

Secure Access for the Real World, Really?

Yes, really. I just got back from Cisco Live! Milan where Chris Young, Senior VP at Cisco, spoke to the Cisco security story, Intelligent Cybersecurity for the Real World. The Cisco security strategy addresses many security challenges across a range of attack vectors (network, endpoint, mobile devices, cloud, or virtual). It covers the entire attack continuum with point-time solutions and dynamic analysis of real-time security intelligence. This reduces the security gaps and minimizes the complexity. Not many network providers or pure security players can make this claim. Ask your secure access provider, how do you address the access to the broad range of threat vectors? And when a threat comes in how do you manage it? Read More »

Tags: , , , , ,

Access Control with Cisco TrustSec: Moving from “IP Addresses” to “Roles and Attributes”

Today’s enterprise is a highly dynamic, and hyper connected environment where IT plays a critical role in connecting the users, devices, resources and corporate IT systems. Today’s employees are also highly mobile in nature and do not necessarily have a single workspace assignment. The IT departments are constantly being challenged by the organization’s Line of Business owners to keep up with the pace of rolling out new services to address market needs, while keeping up with user expectations.

At the same time, IT departments also are responsible for ensuring business continuity and an uninterrupted service. However, the toughest challenge that any IT organization faces is implementing a security architecture which not only satisfies the compliance and industry regulatory requirements, but also provides a sufficient amount of protection against unauthorized access, data breaches, etc.

The traditional way to implement a security architecture in this kind of an environment is by implementing security rules in Firewall for traffic traversing the network’s extranet/intranet or data-center perimeters. For implementing security policies within an organizations network, Identity-Based Networking using IEEE 802.1X is generally used. Read More »

Tags: , , , , , , , , , , , ,

Educause: Bringing Together Technology and Education to Invest in Our Future

It’s amazing to think about the way a traditional classroom operated only a few years ago.  As Renee Patton recently pointed out in her blog post, there were rules, there were barriers, and they were all kept within the confines of an educational institution.  As technology has advanced, those rules have been challenged, barriers overcome, and an entirely new era of learning has emerged.

The collaborative nature of education, educators and learners has allowed new technologies to thrive and innovation to accelerate.  We’re flipping classrooms, implementing mobile learning programs and developing entirely new ways for students to connect and engage.  And we’re looking with excitement toward a future that will continually change the way we teach and learn. Read More »

Tags: , , , , , , , , , , , ,