Cisco Blogs


Cisco Blog > Enterprise Networks

Cisco’s Policy Enforcement Solution Delivers

Whether you need to support BYOD work practices, or provide more secure access to your data center resources, the Cisco Identity Services Engine (ISE) can help. With this all-in-one enterprise policy control platform, you can reliably enforce compliance, enhance infrastructure security, and simplify service operations.

Cisco’s leading One Policy Solution—the Identity Services Engine (ISE)—now delivers even greater capabilities.

Join us next Thursday September 5 to learn about the solution’s newest enhancements—now available with its 1.2 release. The Identity Services Engine provides a comprehensive solution to manage and maintain network access and policies—ensuring consistent enforcement across wired, wireless, and VPN networks. Register today! Read More »

Tags: , , , , , , , ,

Collaboration Solutions: Choose the Right Ones for Productive, Effective Teleworking

In one of my recent blog posts I discussed the value of video for teleworking.

blog pic teleworker hi res EspenFrom this blog I received a lot of feedback from folks wanting examples of the type of technology to use for teleworking.  Many asked, “How do you know what the right technology is to use to support remote and traveling workers without giving up on a quality experience?”  Cisco supports all aspects of telework and remote scenarios with technology that is flexible, interoperable without comprising quality or providing just a “good enough” video experience. Cisco TelePresence personal solutions and video desk phones consistently offer high definition video on every call.  Companies do not want to compromise quality when deploying technology for remote and teleworkers. Cisco solutions offer both high quality and flexibility to support productive, effective teleworking.

Cisco has just released a new white paper that gives an in-depth explanation of the benefits of teleworking based on business class collaboration solutions. These solutions provide organizations the key building blocks in developing and designing a strong foundation for supporting remote workers worldwide.

The closer you get to an in-person experience in meetings with remote employees and teleworkers the more productive you will be.  Today working from a remote location does not mean that you are removed from what is going on back at the office. Cisco delivers flexible high quality solutions for teleworking that bring people together whether they are across town or across the world.

How are you deploying teleworking capabilities to your workforce?

Tags: , , , ,

Limitations of a Software-Only Approach to Data Center Networking

To learn more about Application Centric Infrastructure,
join us for a special webcast with John Chambers and Soni Jiandani
on November 6th at 10:30 am EST/7:30 pm PST/15:30 GMT.
Register here

I want to address some questions about VMware’s NSX virtual networking announcement that have been asked of us by the media and social Web commentators in the past few days. Specifically, they have asked  why Cisco did not announce support for NSX and whether the announcement changes the long-standing strategic relationship between our two companies.

First, let me be clear: VMware is an important partner to Cisco, and we expect to continue our close collaboration around private cloud and desktop virtualization.  As we outlined yesterday in a joint news release about Cisco and VMware’s mutual customers, thousands of organizations rely on our combined innovation in their businesses each and every day and I look forward to continued success in this area.

While we share a common vision for private cloud and desktop virtualization, there are significant differences in our visions over the future of networking.

Network virtualization is important. We both agree on that. In fact, over the past several years, we have delivered game-changing innovations in this area particularly with the Nexus 1000v and more recently with NFV solutions, both of which are key elements of the Cisco ONE portfolio. Today, more than 6,000 Nexus 1000v customers benefit from the flexibility delivered by our virtual networking technology.

However, a software-only approach to network virtualization places significant constraints on customers.  It doesn’t scale, and it fails to provide full real-time visibility of both physical and virtual infrastructure.  In addition this approach does not provide key capabilities such as multi-hypervisor support, integrated security, systems point-of-view or end-to-end telemetry for application placement and troubleshooting.  This loosely-coupled approach forces the user to tie multiple 3rd party components together adding cost and complexity in day-to-day operations as well as throughout the network lifecycle.  Users are forced to address multiple management points and maintain version control for each of the independent components.  Software network virtualization treats physical and virtual infrastructure as separate entities, and denies customers a common policy framework and common operational model for management, orchestration and monitoring.

Cisco has a different strategy and that is embodied in the Application Centric Infrastructure.  Application Centric Infrastructure (ACI) is an innovative secure architecture that delivers centralized application-driven policy automation, management and visibility of physical and virtual networks.  It’s built upon a fabric foundation that delivers best-in-class infrastructure by combining hardware, software and ASIC innovations into an integrated system.

The architecture provides a common management framework for network, application, security and virtualization teams — making IT more agile while reducing application deployment time.  It’s built for multi-tenancy ensuring proper isolation and detailed telemetry of SLAs across different consumers of the infrastructure while also providing a consistent security policy across both physical and virtual applications.  ACI allows IT teams to offer a public cloud experience and economics to their customers while maintaining the associated SLAs and performance requirements for the most demanding business applications.  It’s an open programmable architecture with a comprehensive set of APIs that enables the broadest ecosystem of datacenter management and L4-7 services.  Finally, ACI enables comprehensive investment protection by leveraging existing IT teams’ skillset and infrastructure to lower overall TCO.

I recently wrote a blog post about how Network Virtualization is a Different to Server Virtualization as we think about the next chapter of networking.  It’s key to remember that underutilized compute resources created the opportunity for server virtualization. Underutilization is not a problem in the network. In fact, server virtualization is pushing the limits of today’s network utilization and driving demand for higher port counts, application and policy-driven automation, and unified management of physical, virtual and cloud infrastructures in a single system.  Businesses today are looking for more from their investments as they turn on new services and applications more quickly, in a way that is easier to manage and that can scale with applications needs.

We believe that delivering those benefits requires the flexibility of software coupled tightly with the performance and scalability of hardware and ASICs. That’s what we’re delivering with our Application-Centric Infrastructure vision and throughout the entire Unified Data Center portfolio.

Stay tuned for some exciting news from us in this area in the next few months.

Tags: , , , , , ,

The Best Thinking in Higher Education IT

The largest Higher Education IT event of the year, EDUCAUSE 2013 takes place  in Anaheim, California  October 15-18. We will be there along with about 5,000 key decision makers from the United States, Canada, and around the world.

If you are planning to attend,  visit the Cisco team at booth #601, where we will showcase our Connected Learning solutions for higher education. Stop by and learn how to use your campus network infrastructure to save money, improve efficiency, enhance safety and security, and prepare the next-generation workforce.

Read More »

Tags: , , , , , , ,

[Summary] How Secure Is Your Mobile Worker?

Let’s start with how well do you know your mobile worker?  Understanding the mobile worker’s perceptions and behaviors will offer a better view on the potential security implications your organization must manage.  Cisco just released new global research (white paper) , Cisco Connected  World International Mobile Security study, that explores the mobile worker’s view points on working remotely, connecting to corporate and their sense of security.  Some of the findings are worth reflecting on to help you set the course for your mobile security efforts.

There is no question; the movement for mobile personal devices in the workforce has been well recognized.  A recent response to this trend includes employers (almost half) offering to fund workers buying their own devices.  Allowing “chose your own” device will attract and retain talent and reduce costs (see recent IBSG BYOD research)—but what are the security implications?

There were a couple striking data points to call out:

  • 63% download sensitive data on their device …and the frequency significantly increases in some countries—
  • Most believe remote access is a privilege—yet in some countries they believe it’s a right as a worker—
  • Most are diligent when a pop up appears and read through the details on what it really means. Yet, some workers from select countries tend to be generally less careful.
  • 60% admit to engaging in risky behavior on a device  (personal or company-owned), connected to corporate resources,

So, who really owns the mobile security issue—mobile workers do not take full responsibility for a safe device–as expressed in their high confidence in their IT with over 84% believing that IT will protect them from threats no matter what device.  Read more on http://blogs.cisco.com/security/how-secure-is-your-mobile-worker-2/

Tags: , , , , , , ,