Cisco Blogs

Cisco Blog > Data Center

Cisco Announces Open and Secure Hybrid Cloud with the Collaboration of Cloud Providers and Technology Partners

In my previous blog ,  I noted that IT is increasingly transitioning towards an IT service broker role, taking advantage of multiple sourcing options to become an intermediary of cloud services offered to the business constituents.  The role of IT as a broker of cloud services enables them to add value on behalf of its users by dynamically aggregating, integrating, and customizing the delivery of multi-cloud services (whether public, private or a combination of both) to best meet the needs of the business.

It’s now time for Cisco to take the next bold step in leading the evolution of the “World of Many Clouds,” journey with our partners.  Today, at Cisco Live! in Milan, we announced important news in the significant expansion of our Cloud Portfolio to enable a new Fast IT model. The new products and services in Cisco’s extended cloud portfolio include:

These solutions that we will detail in coming blogs are designed to provide major benefits for your organization as you move to the world of many clouds. They allow you to

  1. Reduce  your exposure to risk in cloud environments.
  2. Enhance your business flexibility with a choice of consumption models in the world of many clouds.
  3. Increase agility and reduce TCO by managing and automating your cloud environments


Cisco Intercloud

Our breakthrough hybrid cloud solution, Cisco InterCloud, which lowers total cost of ownership for organizations and paves the way for interoperable and highly secure public, private and hybrid clouds.  The addition of InterCloud to our Cloud portfolio also broadens Cisco’s commitment to openness and shows the unique value our partner-led model.

Read More »

Tags: , , , , , , , , , , , , , , , , , , , , , ,

Delivering Mobile and Cloud Services Now Gets End-to-End Network Control

From the Data Center across the WAN to the User – with unique Citrix integrations for the Cisco Open Network Environment

In the long history of the Cisco and Citrix partnership, the two companies have worked together to deliver great solutions to many of the largest corporations in the world.  About 16 months ago, we enthusiastically agreed to expand the solution sets we jointly deliver beyond Desktop Virtualization to also address the Mobility, Cloud Services and Cloud Networking marketplaces.  Few other alliances in the industry can match the breadth and depth of the integrated solutions Cisco and Citrix are developing.

This week at Cisco Live in Milan, I now have yet another reason to stay excited about our partnership with Cisco… the new announcement from Cisco about Cisco ONE (Open Network Environment) Platform supporting “both” datacenter and enterprise networks.   Read More »

Tags: , , , , , ,

Top Things to Know About DFA Before Cisco Live Milan

Two weeks ago, I presented a webinar on Dynamic Fabric Automation (DFA) and went over the allocated 1 hour to cover the content.  Yesterday, as I was doing follow up with a hands-on demo, I went over time too. This illustrates how rich DFA is, and how much there is to say about it! Dynamic Fabric Automation is an environment for data center automation that is centered on the CPOM (Central Point of Management), a set of services that are provided with the new Data Center Network Manager (DCNM) release 7.0(1).

The services available on the CPOM provide the following:

  1. Power On Auto Provisioning (POAP)
  2. Inter-switch link connection verification
  3. A single console for configuration
  4. Network Auto-Config Profile provisioning
  5. Message processing for external orchestrator
  6. Automatic host provisioning
  7. Embedded management for network monitoring and data collection

All of these services are provided using standard protocols and applications. For example, the POAP service uses DHCP, TFTP and SCP/SFTP, but using a combination of templates and a very intuitive and easy-to-use GUI, DCNM provides a simplified and systematic way of bringing up your data center fabric. The inter-switch link validation or cable consistency check allows the operator to verify the fabric connections against a predefined template and prevent unexpected connections to come up.

The Jabber process provides the single console for configuration, statistics and troubleshooting. Using any XMPP client, an operator can “chat” with the fabric devices; this approach offers the possibility to organize devices in chat groups that match their role, their location or simply some administrative set. With XMPP, a single command can be sent to multiple devices in a secure way.

The most important element of the CPOM is certainly the network profile provisioning. Read More »

Tags: , , , , , , , , ,

Summary: A Balanced Approach to Mobile Security

For the benefits of collaboration to be better realized, IT leaders must take a balanced and strategic approach to mobile security that focuses more on protecting the network and proprietary data and less on implementing overly broad restrictions.

Gartner recently made three interesting predictions about mobility in the workplace. And while each of these predictions are compelling – they only offer one-side of the story and the solution:

  1. Twenty percent of BYOD projects will fail by 2016 due to IT’s “heavy hand.”
  2. Strict mobility policies will drive employees to want to isolate personal data from business data.
  3. Mobile browsers will gain market share for app delivery for multiple platforms, and the role of HTML5 in solving issues that arise with the multiple platform problem.

Instead, IT leaders should encourage employees to use secure solutions on devices connected to the network. Managing belief and behaviors of users and deploying a flexible infrastructure that can support an open BYOD policy and mitigate advanced security threats, can have tremendous impact on creating an immersive collaborative environment.

Learn more about how Gartner’s mobility and security predictions can affect the future of collaboration by reading the full blog: A Balanced Approach to Mobile Security.

Tags: , , , , , , ,

Cisco Partner Weekly Rewind – January 24, 2014

Partner-Weekly-Rewind-v2Each week, we’ll highlight the most important Cisco partner news and stories, as well as point you to important, Cisco-related partner content you may have missed along the way. Here’s what you might have missed this week:

Well it’s cold. The Polar Vortex strikes the US again and as I sit here in North Carolina, it is 29 degrees outside! But it already feels like communications and events are heating up now that we are on a collision course with spring. As we all bide our time for warmer weather, let’s take a look back at this week.

Off the Top

We had the honor this week of working with Senior Director of Cisco Global Adoption and Seller Readiness Thomas Winter on posting a great blog that should be of interest to a lot of our partners. Thomas’ blog about our Cisco Commerce Workspace (CCW) transformation highlights how we took 21 disparate tools and pared them all down into one. The focus here is on ease of doing business with Cisco but there is also fantastic information on large-scale IT implementation and Thomas does a great job showing what worked for us.

Be sure to check out the blog from Thomas and join in the conversation. Let us know what you think of the new CCW. Read More »

Tags: , , , ,