Cisco Blogs


Cisco Blog > Data Center and Cloud

#InnovateThink TweetChat on Friday, September 19 at 10 a.m. PST: The Way Forward for IT Innovation

In the hyper-competitive Internet of Everything (IoE) era, every company must be ready for rapid innovation, sudden market transitions and ever-changing security threats.

But IoE — the explosion in network connections among people, process, data, and things — is about far more than vexing challenges. It is also about tremendous opportunity: Cisco predicts a staggering $19 trillion in IoE-related Value at Stake over the next decade.

The IT organization has a critical role to play in helping companies  capture these staggering opportunities by driving innovation and enabling business agility and growth.

But where does your organization stand in the overall scheme of IT evolution? To what extent is mounting IoE complexity hindering growth? And what kind of IT model is needed support your company’s efforts to innovate and compete at the hyperspeed of the IoE era?

FastIT TweetI invite you to explore all of these topics and more with me on an upcoming TweetChat on Friday, September 19 at 10 a.m. PST. Join the conversation by using #InnovateThink and #FutureOfIT. We will discuss the current state of IT, its challenges and pain points, and how it can enable business innovation. We will also discuss the solution: Fast IT.  

Fast IT is the way forward. It offers immediate steps toward building a more agile, secure, application-centric infrastructure. And transforming the IT organization into a force for rapid innovation and competitive edge. Fast IT is the IT operating model for the Internet of Everything era. Cisco recently released a major global study of Fast IT — how it can address some of the toughest challenges facing IT today, and show the way forward.

By implementing a Fast IT model, organizations can:

  • Respond to supercharged IoE complexity with infrastructure that is application-centric, automated, and programmable.
  • Capture the full benefit of a far-flung “fabric of clouds,” moving seamlessly across even the most extensive hybrid-cloud ecosystems
  • Drive the necessary organizational changes that will raise IT to the status of trusted advisor to the business and a true partner in innovation
  • Reap the benefits of a 20 to 25 percent reduction in costs, which can then be reinvested in new capabilities to drive innovation and business outcomes
  • Meet an ever-expanding threat landscape with dynamic, policy-driven security solutions

 

Tags: , , ,

Dynamic Cyber Attacks Call for Dynamic Controls

Last month’s earthquake in Napa Valley got me thinking. In earthquake-prone areas, new construction is being built to move dynamically to withstand shocks and tremors. Innovative materials and designs sway and bend to provide better protection. But older buildings based on traditional, static design concepts can suffer devastating damage in an earthquake and its aftershocks.

It’s similar to the journey we’re on in the security industry, which is scaling to better address the harsh realities we face as defenders. At Cisco, we track this journey through a scale of controls we refer to as  the Security Operations Maturity Model, which moves from static to human intervention to semi-automatic to dynamic and, ultimately, predictive controls. I will talk more about this scale in the coming weeks, but for now, let’s focus on the need for most organizations to shift to dynamic controls.

We all know that the security landscape is constantly evolving and attackers are innovating in lockstep with rapid changes in technology. In fact, as I talk with security professionals daily about the challenges they face, a few consistent points come up:

  • As new business models are built on innovations in mobility, cloud, the Internet of Things (IoT) and Everything (IoE), security solutions and processes must become more dynamic and more scalable to keep up with the change;
  • Further, as hacking has matured and become industrialized, the security models used to defend need to mature as well; and
  • Finally, there’s too much complexity, fragmentation, and cost in legacy security deployments.

A recent malicious advertising attack called “Kyle and Stan”, discovered by our Talos Security Intelligence and Research Group, demonstrates the challenges defenders are up against -- read their full post here. Posing as legitimate advertisers, cybercriminals contact the major advertisement networks to try to get them to display an ad with a malicious payload packed inside of legitimate software – spyware, adware, and browser hijacks, for example. They target popular websites and instruct the companies to run the ad for just a few minutes, leaving little or no time for the ad content to be inspected. In this case, malvertising victims were faced with an often-unprompted download of what appeared to be legitimate software with a hidden malicious payload. The malware droppers employ a range of clever techniques to continuously mutate in order to avoid detection by traditional, point-in-time systems.

Read More »

Tags: , , , , , , , ,

Cloud first + RDK + Application framework = Service velocity

By Paul Claussen, Director, Product Management, Cloud Applications, Cisco Service Provider Video Software and SolutionsPaulClaussen.SPVSS

If there’s one constant, in the need to compete more effectively against the growing roster of over-the-top (OTT) video providers, it is the need to move services and products to the consumer marketplace more quickly.

Think about it: Every provider of an over-the-top service, video or otherwise, grew up on broadband. Even their “legacy” components were born, originally, on Internet Protocol. Netflix, Amazon/Love Film, iTunes, Break Media — all of them are, in essence, broadband natives. Read More »

Tags: , , , , , , ,

It’s a Brave New Virtualized World With InterCloud, 4K, Analytics, Advertising, and So Much More

christelle gentalWritten By Christelle Gental

The IBC (International Broadcasting Conference) opens again in Amsterdam this autumn with Cisco demonstrating advanced solutions that push the envelope of new technologies offering Service Providers new and innovative services to their customers whilst reducing the costs in delivering these advanced services utilizing newer infrastructure architectures.

Cisco’s report on the growth of Internet traffic (the VNI Global IP Traffic and Service Adoption Forecast) declares that by 2018, the world will reach 2.5 trillion Internet video minutes per month.  That’s 5 million years of video will cross the Internet each month. The quality of video is also increasing, with 4K video technology now becoming available. Soon this will become mainstream as video Service Providers are gearing up toward providing HEVC across all delivery platforms -- cable, satellite and broadband.

4k demo-Scott Meek

It isn’t just the high resolution services that are changing; the demand from customers to view their content on more and more devices, with differing formats and a more ‘personalized’ experience, is still prevalent. New trends are also starting to emerge. The Internet of Everything (IoE) is an exciting new market for Service Providers to explore and leverage to provide innovative new services outside the traditional delivery of video. Cisco have been at the forefront of the IoE revolution, with John Chambers predicting that IoE will have a significantly greater effect on people’s lives than even the internet has done!

As services provided to customers change, so do infrastructures.  An example is the move from large private data centres to Read More »

Tags: , , , , , , , ,

Journey to the Cloud: a Smooth Transition

I speak with many business leaders about “the cloud” and how best to use it to improve collaboration. Quite often, discussions end up getting into specific services and technologies but I always try to ensure that some basic considerations are a primary focus – namely People, Processes and Culture. This video is a great overview and insight into how important it is to get the foundations right, and what questions you should ask before you start looking for a specific solution or ‘technology’.

The Three Considerations

People

People

People are your company’s greatest asset and you need to enable them fully and effectively. Increasingly, they “vote with their feet.” They use their own solutions or those provided directly by their departments instead of official IT options (shadow IT). For many reasons public cloud services are a big hit, but you can’t afford for the virtualized environment you have painstakingly created to be used only for functional or legacy workloads.  Nobody can afford a discrete, separate underutilized platform -- unappreciated and with hidden value. Read More »

Tags: , , , , ,