Customers’ expectations have never been higher. They want choice and flexibility. They require intelligent networks and infrastructure that’s intuitive, secure, easy to use and manage, and able to adapt to the specific requirements of their applications.
Today we’re excited to announce Cisco ONE Software, which offers a simplified solution to the most relevant, frequently-used customer scenarios in the data center, wide area network and local access networks. Cisco ONE is a big deal, and it’s an important piece of our larger software strategy in a world where value is increasingly delivered to customers through software.
Think about the technology disruptions and market transitions our customers are experiencing today. Cloud, virtualization, big data, software-defined networking, software-as-a-service (SaaS), the Internet of Everything – software is the enabling mechanism at the heart of each. In recent years, software has played an increasingly key role in our technology and solutions. Today, we are the fifth-largest software company in terms of software revenues, and the third-largest SaaS provider.
Read More »
Tags: analytics, Cisco ONE, cloud, Enterprise Networking, software
In the more than ten years, I have worked in developing security solutions, I have witnessed the steady evolution of security threats and the incredible strides made to combat them. Recent high profile security breaches have shown that a breach in security can have serious consequences.. It can lead to loss or destruction of business assets, bad publicity and its associated effect on a company’s brand, hefty regulatory fines, disruption of services and costs associated with numerous lawsuits. The main task of a hacker is to access business assets through the network without being detected. The threats are normally cloaked within ubiquitous traffic flows such as web or email. Whatever the nature of a threat, an attack leaves signatures behind that can be used to “un-cloak” the threat. Threat defense and visibility is the watchword.
It has been exhausting to many of us, to be constantly engaged in the never ending cat and mouse game we play to manage and detect cyber threats. When it comes to securing private and public clouds, a new generation of Read More »
Tags: Cisco Cloud Security Architecture, cloud, cloud architecture, cloud consumers, cloud security, cyber threats, invisible threats, Service Provider
If you are a fan of TechWise TV, like I am, then you are always curious as to what Jimmy Ray and Robb are going to delve into next. In the latest Techwise TV episode focused on Cisco Meraki cloud-managed IT, the TechWise guys have amassed a band of technical and cloud-managed experts to discuss what cloud-managed IT is really all about.
The TechWise TV guys will look at the Cisco Meraki solution to see if simplicity means reduced functionality, or if you need to sacrifice security to have a more agile solution. They will also discuss how data is handled, what it means from a business protection perspective, along with a lot of other top of mind questions.
Check out the latest episode here:
Tags: Cisco Meraki, cloud, Techwise TV
Moving to cloud offers many benefits to organizations. However, these benefits come with a corresponding range of new challenges for IT to address. One of these challenges is what is known as “Shadow IT.” Shadow IT refers to activities of members within an organization to secure their own IT resources without going through a company’s IT department.
There are many compelling reasons why organizations consider Shadow IT an important issue:
Security: IT resources outside the management of a company’s IT department are also outside of their control and policy management. Many cloud providers offer only marginal security with their baseline service; to get better security requires an upsell and higher cost. This means that sensitive company data and digital assets may be exposed without a company’s knowledge. As a result, a company may be at risk in many ways, either through potential loss of customer data or failure to comply with industry standards and requirements.
Cost: When cloud services are purchased individually, they cost more. A large organization can consolidate cloud resources needs across all of its departments to achieve volume-pricing discounts.
Efficiency: A group that purchases its own cloud resources may underutilize them. When clouds resources are managed by IT, unutilized resources can be shared with other departments. Such a strategy increases the efficient usage of cloud resources. In addition, fewer resources are required across the company, resulting in lower cost as well.
Unified Management: When cloud resources can be centrally managed, their management can be consistent and unified across the company. This enables IT to ensure that cloud resources are properly protected as well as simplifies tracking allocation and usage of resources.
There is a high value in eliminating Shadow IT. However, it is clear that relying upon policies that prohibit Shadow IT activities is not enough to solve the problem. In the blog, “Overcome Your Shadow IT Struggles”, cloud provider Presidio discusses the reasons why Shadow IT exists. The blog also describes how you can provide compelling reasons for members of your organization to go through IT and use internal resources.
Another important facet of eliminating Shadow IT is selecting the right cloud services and provider. It does little good to consolidate cloud access if the services IT brokers to the organization don’t provide enterprise-class security, performance, and flexibility as a baseline.
Learn more about how Hybrid Cloud and Cisco Powered cloud and managed services can transform your business.
Tags: cloud, Hybrid Cloud, Shadow IT, xander Uyleman
By Kevin Bloch, Cisco Chief Technology Officer, Australia and New Zealand
One of the best parts about my job is that I get to spend a lot of time listening to some very smart people, both internally within Cisco and externally. As we touch so many parts of the global technology industry and market, it puts me in a fantastic position to see what’s coming down the track. So, each year around this time, I take the opportunity to offer some predictions for the year ahead (which, incidentally, is Cisco’s 30th birthday).
It will probably come as no surprise that the biggest theme you’ll hear about this year is digital transformation, which is essentially underpinned by the Internet of Everything (IoE). In the next twelve months, enterprises will spend more than $40 billion globally, designing, implementing and operating the Internet of Things (IoT). Already thirty-eight percent of technology spend is outside of IT.
Read the full Top 10 ICT Trends in 2015 blog and feel free to provide any feedback.
Tags: cloud, Hybrid Cloud, IoE, IoT, mobile, NFV, SDN, security, software, video, wifi