Cisco Blogs


Cisco Blog > Partner

Internet of Everything Opportunity is there for our Partners

Those of you that attended the 2014 Consumer Electronics Show last month heard Cisco Chairman and CEO John Chambers’ keynote address discussing the potential $19 trillion opportunity in the Internet of Everything (IoE). John even mentioned that the combined value of the opportunity might be conservative. (If you missed John’s speech you should definitely check out the highlights.)

John talked about “connecting the unconnected” and that this area is where our Partner Ecosystem has to be ready to do some serious work. We know we have to evolve with you and make sure we are all prepared to tackle that $19 trillion opportunity that is out there.

There is real value in our partner ecosystem and in connecting partners with each other. We will certainly be talking about this more and more as we move further into 2014, especially with such a large focus on IoE. Read More »

Tags: , , , ,

…And The Momentum Continues! New Nexus Data Center Innovations AND Customer Deployments!

You probably have already heard that during CiscoLive Milan, we have unveiled the new additions to our Data Center and Cloud networking portfolio:

New Nexus Switches

  • New Nexus 7706 and a high density F3 Series 1/10G module for Nexus 7700 provide increased deployment options for data center interconnect, core or aggregation.
  • The next generation Nexus 5600 family offers VXLAN bridging and routing capability, line rate L2/L3, and 40G uplinks, to deliver high performance in a compact form factor for 10G Top of Rack, 1/10G FEX aggregation deployments.
  • New Nexus 6004 Unified Port LEM Module brings industry’s highest UP port density in a four RU form factor simplifying LAN and SAN convergence.
  • New Nexus 3172TQ top of rack 1 RU switch delivers industry-first 1/10G BaseT copper server access and superb performance combined with robust NX-OS features.
  • New Nexus 1000V on the Kernel-based Virtual Machine (KVM) hypervisor brings OpenStack cloud a fully integrated network virtualization solution that can be deployed consistently across VMware, Microsoft, and Linux based software platforms.

AND THERE HAS BEEN BROAD CUSTOMER ADOPTION ACROSS THE DATA CENTER! 

Data Center Nexus Networking Momentum

From Nexus 1000V to the Nexus 9000, Cisco’s holistic approach resonates with customers because it provides increased business agility, operational efficiency, and empowers IT to rapidly evolve as business requirements change.

Here are the latest examples of why our customers chose Nexus:

Read More »

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , ,

Summary: Tackling Mobile Security Risks for Government

As mobility becomes more pervasive, these concepts of cyber crime have become engrained in our work/life culture. These issues have earned national news headlines as governments across the globe grapple with how to build both secure and mobile-enabled infrastructures.

A few weeks ago, Cisco and Mobile Work Exchange released findings from a self-assessment tool that highlights some interesting statistics, enabling us to better understand mobile security best practices and vulnerabilities. The report specifically looks at government employees, 90 percent of whom claim to use at least one mobile device for work, and reveals that many government workers (41 percent) are putting themselves and their agencies at risk. Read More »

Tags: , , , , , , , , , , , , , , ,

Summary : Beyond Data Security…Five Biggest Risks of Shadow Cloud IT Services

In his recent blog (Unleash the Promise of Cloud), Enrico Fuiano reports  how a Cisco Intel study  clearly indicates that Line of Business (LoB) leaders have been playing a more important role in driving requirements for IT solutions and services. Amongst the reasons driving this shift, Enrico pointed to the “shadow IT” initiatives.

BobDimiccoRobert  Dimicco, Cisco Senior Director , Global leader and founder of Cisco’s Cloud Consumption and Broker Services Practice  tells  a similar story , as he recalls  a recent  conversation with a CIO “My CFO and CEO just asked me if I knew how many of our users were accessing cloud services. They asked me if I knew how much we were spending or if there were any risks.” He said, “Bob I don’t know the answers, and I don’t have a plan.”

In his blog, “Beyond Data Security ..Five Biggest Risks of Shadow Cloud IT Services “ Bob shares that “In working with our customers, we have found that there are typically 5-10 times more cloud services being used than are known by IT.”  This challenging trend, called Shadow-IT is not without any risk . In fact , Bob describes  the 5 major risks of Shadow IT which are

  • Data Security Risks
  • Brand Risks
  • Compliance Risks
  • Business Continuity Risks
  • Financial Risks

So how to identify these risks and deal with them ? Bob explores the benefits and  services offered by the Cisco Data Center Assessment for Cloud Consumption.

  • Identify unauthorized cloud services and gain greater visibility into your cloud usage in order to reduce
    security and financial exposure
  • Mitigate risks by proactively identifying risk and compliance issues associated with cloud usage
  • Reduce costs through recommendations to consolidate and/or eliminate cloud services
    ◦ Obtain early warning of overage and related charges
    ◦ Identify duplicate services and identify potential candidate cloud services for consolidation
    ◦ Highlight over- and underutilized services
    ◦ Estimate potential cost savings through a customized financial model
  •  Enable greater business agility through cloud governance, which can help IT and LOBs
    efficiently select and deploy cloud services to rapidly meet organizational needs
  • Enable greater business agility through cloud governance, which can help IT and LOBs
    efficiently select and deploy cloud services to rapidly meet organizational needs

To learn more, and start now to build a plan,  check Bob’s blog here 

Tags: , , , , ,

Tackling Mobile Security Risks for Government

“Cyber threats. Security breaches. Hacking.”

As mobility becomes more pervasive, these words have become engrained in our work/life culture. The issue of cyber crime has earned national news headlines as governments across the globe grapple with how to build both secure and mobile-enabled infrastructures.

A few weeks ago, Cisco and Mobile Work Exchange released findings from a self-assessment tool that highlights some interesting statistics, enabling us to better understand mobile security best practices and vulnerabilities. The report specifically looks at government employees, 90 percent of whom claim to use at least one mobile device for work, and reveals that many government workers (41 percent)  are putting themselves and their agencies at risk.

Cisco_MobilitySecurity_PatFinn_Final

Here are a few other compelling findings:

  • On mobile devices, 31 percent use a public Wi-Fi connection and 25 percent do not set passwords.
  • 6 percent of government employees who use a mobile device for work say they have lost or misplaced their phone. In the average Federal agency, that’s more than 3,500 chances for a security breach.
  • Despite the Federal Digital Government Strategy, more than one in four government employees have not received mobile security training from their agencies.

Read More »

Tags: , , , , , , , , , , , , , , ,