So many students, so many devices, yet zero increase in number of IT staffers. The increasingly unbalanced ratio is enough to cause a few nightmares for any IT professional. Luckily, supporting student IT requirements, while remaining secure, has become a bit simpler with Identity Service Engine (ISE) Policy Deployment, part of Cisco BYOD Solutions for K12 Education. With ISE, IT staffers can quickly add and support student’s devices like laptops, smart phones and tablets and at the same time ensure the protection of student information access, dynamically control who gets access to what and provide optimal network user experience. You can be rest assured that we have your back while you balance it all.
Protection of Minors – Let’s face it – K-12 means we’re talking about minors, so we need to tread quite carefully. Extending network access across wired and wireless opens education to a world of innovation; yet it also opens the network up to security threats. 64% of parents feel it is a schools responsibility to effectively teach students how to use their mobile devices safely [Info graphic]. Protection of access to and access by students is a high-priority. It is critical to restrict access to confidential student records while making sure students get the right access to resources they need for learning. The ISE component of the K12 BYOD Solution protects student information through secure, role-based, application access – simply – over the wired and wireless infrastructure. Read More »
Tags: bring your own device, byod, campus, Cisco, device, education, enrich, Google, ISTE, K-12, K12, LAN, learn, mobile, mobile device, mobility, network, networking, school, school district, server, solution, student, tablet, teach, technology, wi-fi, wifi, wireless, wireless network, wlan
This is a follow up from my post last week that announced this webcast. Today it was a treat to have Richard Noguera as our special guest and who is uniquely qualified to speak on the topic of key imperatives for today’s CISO for the data center. Rich is a youthful InfoSec veteran who has led teams at Yahoo, Symantec and McAfee as well as held consulting roles and presently at Accenture in a Security and Risk management strategy role. I wanted to provide you access to the slides as well as summarize some of the key points Rich educated us on today.
As a concept, cloud is the one that most interested our audience today. We are seeing heavily virtualized data centers with private clouds, cloud attached data centers that leverage Infrastructure as a Service (IaaS) facilities for rapid service deployment or capacity management, and hybrid clouds that mix/match based on implementation needs. Most of our customers have embraced one of the above models. And, so I am going to focus on our imperatives accordingly.
Imperative 1: Enable IT to Play a More Strategic Role
Gartner predicts with market maturity that enterprises will increase migration of *mission-critical* functions to *public* cloud services over the next 3-5 years. IT and InfoSec must adapt and consider an alternative means to maintain the confidentiality, integrity, and availability of their business services, data, and users. For the ‘extended enterprise’ to operate effectively then, access control and data exchange between cloud service providers (CSP) needs to be standardized. Organizations should look to implement a Cloud Services Brokerage (CSB) – whether internally or externally, utilizing private/public/hybrid clouds – to accelerate service implementation and integration and also ensure visibility and cohesive security policy across multiple cloud service providers.
Imperative 2: Business-driven Security and Risk Metrics
Read More »
Tags: Cisco, CISO, cloud, data center, security
Recently I spent time at Cisco Live Orlando where I caught up with Trey Layton, CTO, VCE. We had an opportunity to talk about automation and orchestration of Vblock with Cisco UCS Director (formerly Cloupia). Over recent months, we have been doing even more work for our customers, collectively between our companies, to do deeper integration and to simplify the management, administration, provisioning and automation of our converged infrastructures.
As we see the continued trend to move to a services model in IT and adopt a private cloud infrastructure, Cisco UCS Director is the only solution to provide single pane of glass automation and provisioning of all virtual and physical assets and can provide end-to-end orchestration across server, network and storage resources. With Vblock, it provides our mutual customers an elastic pool of resources to be able to consume and adapt to various applications and use cases that customers are deploying in the virtualized or bare metal environments.
We are excited about the developments around both what UCS Director and Vblock are delivering, and there is a lot more in the works moving forward to continue to support simplification and agility for our customers’ data center architecture.
- The next release of UCS Director will add VMAX and VNXE storage support to the product by September. This will allow UCS Director to support all Vblock models with complete server, network and storage provisioning automation.
- The UCS Director task library will include over 50 Vblock specific tasks to allow users to easily build model-based automation workflows to dynamically provision the system.
Cisco continues to innovate, delivering technology and solutions that provide real value to our customers. Tomorrow starts here.
Tags: automated provisioning, Cisco, cisco private cloud, cloud, Cloupia, Converged Infrastructure, data center, dominick delfino, integrated stack, private cloud, Provisioning, trey layton, UCS, ucs director, ucs management, Vblock, VCE, virtualization
Within the coming decade, Internet Protocol version 6 (IPv6) will be key to enabling 50 billion connections among people, processes, data, and things in the Internet of Everything (IoE). But how we get there from here is not a simple matter.
I’m very pleased to invite Mark Townsley, Cisco Fellow and recognized industry expert on IP, to discuss this important transition in the second of our three-part blog series on IPv6. The first blog in Mark’s series was “Demystifying IPv6”.
Three years ago, I organized a conference in Paris where I thought it would be fascinating to bring together the original designers of IPv6 alongside the engineers who were finally deploying it at scale more than a decade later. During this discussion, Steve Deering, one of the “fathers” of IPv6 in the 1990s, was asked one of the most common questions about IPv6: Why wasn’t it designed for backward compatibility with IPv4? After all, wouldn’t it be easier to make the transition if the two versions could transparently coexist? Steve answered that the problem is not that IPv6 wasn’t designed to be backward-compatible—the real problem is that IPv4 wasn’t designed to be forward-compatible.
Steve was making the point that IPv4 was designed with a fixed address space. Given the number of computers connected to the Arpanet throughout the 1970s, this fixed-length address field seemed to be sufficient—at least for that version of IP. IP had been replaced before, and it seemed perfectly reasonable at the time that it might be replaced again. Read More »
Tags: 6rd, Cisco, Internet of Everything, internet of things, internet protocol, IoE, IoT, ip, ipv4, IPv6, IPv6 rapid deployment, map, mapping of address and port
Imagine a customer calling their insurance provider and reaching a representative that has never spoken with them and is unfamiliar with the customer’s claims history or company policies. That doesn’t sound like a good experience. Now imagine after a quick verification from the customer, the same representative is able to access the customer’s complete insurance profile, detailing coverage history and other necessary information needed to forward their inquiry to the proper agent or broker. The latter experience is now a reality, made possible by connecting data sources across the Cisco enabled network. By bringing together data, it allows insurers to get a full picture of their customers and allows them to create a differentiated customer experience, helping increase customer satisfaction, retention, loyalty, and referrals.
Insurers are continually looking for the best way to attract and retain customers while also increasing cross-sell opportunities. By employing data mining coupled with collaboration technology, insurers are changing the way transactions are conducted. Many insurers are using technology to their benefit; not only through offering differentiated services or channel choices to customers, but also by the information gathered from customers. Read More »
Tags: Cisco, collaboration, customerexperience, Financial Services, insurance