Cisco Blogs


Cisco Blog > Data Center

Relationships, Relationships, Relationships: Cisco at Microsoft Worldwide Partner Conference

When I think of why technology solution providers should attend Microsoft’s WPC, I decided to pay homage to one of Steve Ballmer’s mantras with my blog title.

Last year, at Microsoft’s WPC in Toronto, I was approached by KEMP Technologies (a Microsoft Gold Certified Partner). They gave me an elevator pitch on their products and explained they were interested in partnering with Cisco. Their load balancing solutions sounded interesting and anything that might sell more UCS servers sounded like a win win to me. After all, Cisco didn’t become the #2 blade server vendor worldwide1 by itself. I told them I would try and find the right contact for them.

A few emails on my part and a lot of hard work by the Cisco and KEMP teams, a year later KEMP is now IVT Certified for UCS. While not an exclusive relationship, we can now offer our customers another excellent choice.

Stop by the Cisco booth (#1401) and talk with the datacenter team or KEMP’s booth (#1725). You never know what might come of it.

Kemp_Banner

1. Source:  IDC Worldwide Quarterly Server Tracker, Q1 2013 Revenue Share, May 2013

Tags: , , , , , , , , , , , ,

Three Imperatives for Today’s CISO for Data Center Security : Why you should attend our upcoming Webcast on July 16

AJ25293The data center landscape is undergoing remarkable transformation and security is being forced to evolve as organizations embrace more dynamic services.
For instance, Gartner predicts 17.9% CAGR in cloud services usage through 2016. As such, Chief Information Security Officers (CISOs) will need to consider how to secure non-standardized Business-to-Business interconnects across their organizations. CISOS will play a pivotal role in shaping the next-generation data center if they are able to act more strategically.
I call this my 3 imperatives for CISOs.

I am teaming up with my former mentor from McAfee and now colleague through our Cisco partnership, Rich Noguera, Sr Manager, Security Strategy and Risk Management at Accenture, to discuss this topic on July 16- 8:00 am PST/ 11:00 am EST

1.     Enabling IT security to play a more strategic and advisory role within the organization – today’s CISO needs to think much more in terms of establishing a risk-aware culture as increasingly the economic advantages of moving to the cloud becomes much more compelling.  Strategically speaking, CISOs must consider building or buying a cloud services brokerage that is capable of enforcing corporate security policies across the business’ varied providers.  There is an opportunity to shift IT away from being considered a necessary cost center to a department, which can enable self-provisioning of new services (with the right tools and training). But to do this, it requires a forward thinking organization with a security steering committee with stakeholders from across the enterprise engaged to ensure that security and risk considerations are factored in.

2.     Business-driven security and risk metrics  – It is a well-known phenomenon that when nothing negative in data center security happens (for example, malware disruption, data breach), it may become challenging to demonstrate the ROI on security even though security met its purpose.  Leading organizations are twice as likely to use metrics to monitor progress and their ability to deal with future technologies as well as metrics to justify the purchase and need of new technologies.  As the old adage goes, ‘you cannot manage what you cannot measure.’ Given the range of cloud enabled B2B services, CISOs should concentrate on what matters most – who (i.e. users) and what (i.e. crown jewel data) – to the security of the business.

3.     Balancing key technology focus areas with risk metrics - As data center workloads spiral and so too, correspondingly does the volume of security data, CISOs and security teams will need to find ways to filter data to a meaningful metrics.  That is where expressing security policy in business contextual terms and security intelligence data and filtering becomes critical.

Register here for this webcast on July the 16th to further discuss these key issues and see how datacenter can enable security to be transformative. Additionally, for more news and discussions, head over to @SecDatacenter or Secure Data Center Trends

Tags: , , ,

Creating a Wi-Fi Monetization Virtuous Circle

In the decade or so that Wi-Fi has existed, most technologists and mobile industry executives viewed it as the “poor cousin” to licensed mobile communications.  Now mobile operators around the world are asking how they can effectively use Wi-Fi to help them cope with the huge surge in mobile data traffic and to meet customer needs and expectations.  In addition, they are all eager to understand how they can make money from Wi-Fi and to make the business case to justify investments in deploying Wi-Fi networks.

As many leading SPs are now discovering building a Wi-Fi network creates not only significant business value, but creates a virtuous circle that leads to ever-increasing sources of new Wi-Fi value. As the Wi-Fi Monetization Virtuous Circle outlined below shows, the reinforcing network and scale effects of Wi-Fi investments not only deliver unique business benefits at each of the levels, but also establish a valuable platform to exploit additional monetization opportunities at the next level.

Untitled

Read More »

Tags: , , , , , , , , , ,

802.11ac in the Healthcare Industry

Live Webinar on 802.11ac in Healthcare July 16, 10am | Register Now

3600_module

With any new wireless technology, much of what is initially written in the first year is usually focused around the bits and bytes and the speeds and feeds of the technology. This is true for 802.11ac where any Google search will yield a plethora of articles on the potential of Gigabit wireless or that it runs on the 5GHz band and could have up to 8 spatial streams. However, the conversations must start moving towards discussing how the technology can be used in practical situations. In the case of our 802.11ac Module for the 3600, we feel very strongly that it is necessary to not only talk about the speeds and feeds of  802.11ac, but also show how a customer plans to use 802.11ac.

That’s why at our popular presentation at Cisco Live! Orlando, we first discussed the 802.11ac Standard, Cisco’s 802.11ac solution and how it can be used in various networks, and then invited representatives from Methodist Hospital in Houston, TX to discuss their experience to date with 802.11ac. Read More »

Tags: , , , , , , , , , , , , , , ,

Polish Cable Operator Vectra Readies their Network for 100G

Cisco ONS 15454 M6 DWDM Platform

Cisco ONS 15454 M6 DWDM Platform

It’s been a busy year (and by year, we mean fiscal year, which ends in a few weeks) for Cisco’s optical solutions team. We’ve had a number of customer announcements for our 100G nLight DWDM technology and most recently scooped up an award for our CPAK-based 100G transponder card. Service providers across the globe have responded positively to Cisco’s ability to extend 100G services across network that were engineered for 10G wavelengths, and with CPAK we’re reducing the space and power and increasing the density of 100G services in routers (CRS-X), data center switches (Nexus 7000), and optical transport equipment (ONS15454 MSTP).

The news for today centers on our latest customer announcement for our DWDM solution, Vectra S.A., one of the largest cable operators in Poland has deployed Cisco for their new national fiber optic backbone. The network is a nationwide ring, connecting nearly thirty
 cities around Poland, including Warsaw, Katowice, Wroclaw, Poznan, Radom, Bydgoszcz, Torun, and Gdynia. Read More »

Tags: , , , , , , , , ,