Cisco Blogs


Cisco Blog > Partner

Cisco Partner Weekly Rewind – July 19, 2013

Partner-Weekly-Rewind-v2

Every Friday, we’ll highlight the most important Cisco partner news and stories of the week, as well as point you to important, Cisco-related partner content you may have missed along the way. Here’s what you might have missed this week:

Off The Top

We are always seeking to make it easier for partners to do business with Cisco. One of the items both customers and partners have inquired about is our Return Materials Authorization (RMA) process. Historically, Cisco has operated an RMA back-end swap process. Based on feedback from Cisco customers, we have now moved to a front-end RMA swap process that immediately updates your contract information with the new part information at the start of the RMA process.

Check out Cisco Senior Director of Technical Services Jim Fuller’s comments on the new process and how it will make it easier for you to do business with Cisco.

Are You Doing All You Can With Social Media? Read More »

Tags: , , , , ,

[Cartoon Catalyst Blog Series] K-12 BYOD. Secure Students, Determine Internet Access, and Yet Provide Awesome Network Performance?

Students bounding into schools touting the latest device is creating big problem for K-12 IT departments. How can schools support BYOD initiatives while securing these mobile devices and the student information embedded within them if IT staff numbers aren’t growing?

In his latest blog, K-12 BYOD. Secure Students, Determine Internet Access, and Yet Provide Awesome Network Performance?, Cisco’s Rahul Chohan discusses how Identity Services Engine policy deployment as a part of Cisco BYOD Solutions for K12 Education helps simplify mobile device security streamlines the IT security processes required to deploy BYOD. Rahul’s blog covers how ISE helps protect minors, ensure performance, and simplify IT over the wired and wireless infrastructure. How exactly can it do this? You’ll have to read his blog to find out.

For more on Cisco BYOD Solutions for K12 Education page.

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

Three Simple Ways to Boost Mobile Device Security

The explosion in business mobility is transforming our companies in profound—and sometimes challenging—ways. One of the most vexing issues is security.

Recently, I came across a Wharton article predicting that by 2015, more Americans will access the Internet through mobile devices than PCs. From open data to an increase in government-accessed information, this sweeping trend raises questions about the true security of mobile networks and devices. But how can an organization support the infusion of wireless devices into employees’ lives without opening the door to heightened security risks? Read More »

Tags: , , , , , , , , , , , ,

[Cartoon Catalyst Blog Series] K-12 BYOD. Secure Students, Determine Internet Access, and Yet Provide Awesome Network Performance?

So many students, so many devices, yet zero increase in number of IT staffers. The increasingly unbalanced ratio is enough to cause a few nightmares for any IT professional.  Luckily, supporting student IT requirements, while remaining secure, has become a bit simpler with Identity Service Engine (ISE)  Policy Deployment, part of Cisco BYOD Solutions for K12 Education.   With ISE, IT staffers can quickly add and support student’s devices like laptops, smart phones and tablets and at the same time ensure the protection of student information access, dynamically control who gets access to what and provide optimal network user experience.  You can be rest assured that we have your back while you balance it all.

K-12 TightRope1    

Protection of Minors – Let’s face it – K-12 means we’re talking about minors, so we need to tread quite carefully. Extending network access across wired and wireless opens education to a world of innovation; yet it also opens the network up to security threats. 64% of parents feel it is a schools responsibility to effectively teach students how to use their mobile devices safely [Info graphic].  Protection of access to and access by students is a high-priority.  It is critical to restrict access to confidential student records while making sure students get the right access to resources they need for learning. The ISE component of the  K12 BYOD Solution protects student information through secure,   role-based, application access – simply – over the wired and wireless infrastructure. Read More »

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

Three Imperatives for Today’s CISO for Data Center Security: Key Takeaways from Today’s Webcast

This is a follow up from my post last week that announced this webcast. Today it was a treat to have Richard Noguera as our special guest and who is uniquely qualified to speak on the topic of key imperatives for today’s CISO for the data center.  Rich is a youthful InfoSec veteran who has led teams at Yahoo, Symantec and McAfee as well as held consulting roles and presently at Accenture in a Security and Risk management strategy role. I wanted to provide you access to the slides as well as summarize some of the key points Rich educated us on today.

Three imperatives for today¹s ciso for data center fina lv rn[2] from Cisco Data Center

 

As a concept, cloud is the one that most interested our audience today. We are seeing heavily virtualized data centers with private clouds, cloud attached data centers that leverage Infrastructure as a Service (IaaS) facilities for rapid service deployment or capacity management, and hybrid clouds that mix/match based on implementation needs.  Most of our customers have embraced one of the above models.  And, so I am going to focus on our imperatives accordingly.

Imperative 1: Enable IT to Play a More Strategic Role

Gartner predicts with market maturity that enterprises will increase migration of *mission-critical* functions to *public* cloud services over the next 3-5 years. IT and InfoSec must adapt and consider an alternative means to maintain the confidentiality, integrity, and availability of their business services, data, and users. For the ‘extended enterprise’ to operate effectively then, access control and data exchange between cloud service providers (CSP) needs to be standardized. Organizations should look to implement a Cloud Services Brokerage (CSB) – whether internally or externally, utilizing private/public/hybrid clouds – to accelerate service implementation and integration and also ensure visibility and cohesive security policy across multiple cloud service providers.

Imperative 2:  Business-driven Security and Risk Metrics

Read More »

Tags: , , , ,