In Cisco Data Center Services, we’ve been building towards this for the past 3 or 4 years. We’re formalised our approach over the past year. Our early adopter customers have already given us terrific feedback.
And tomorrow I’ll start telling you all about this via a series of blogs. Follow me on Twitter (@StephenSatCisco) for a quick summary as the series progresses.
Now, if you are at the Gartner Data Center conference this week in Las Vegas, please do drop by the Cisco stand and seek out the Cisco Services team and my good colleague, Erik Vogel, a director in our Data Center Services practice team. He’ll tell you all about it today!
So watch this space -- you heard it here first!! (Wow, I’ve always wanted to say that :-))
As I mentioned in a previous post, I was in London last week at a conference. I picked up the badge shown in the photo below, and it made me laugh, and I thought it would be a good image to pass on. VCE’s Vblock was the only example of converged infrastructure on show there.
Physical servers lend the comfort of knowing where your data is located and having control over access and protection of that data. But from a business perspective, there is a lot virtualization can offer. So what’s the compromise with security, and is it worth the switch to a cloud environment?
While the cloud is an “open environment,” with no physical equipment to hold data in a hard-and-fast location, there are security measures that can be taken. Understanding how your technology is being used and who would be interested in accessing stored information is an important step in protecting against security threats. It is also important to consider what type of cloud you are utilizing – public, private, or hybrid. When analyzed thoroughly, you can then integrate security controls into your architecture to view, manage, and control vulnerability and threats.
Finally, you must consider trust. How the technology is used depends on users, devices, applications, and data. Security policies and controls can be determined and installed after establishing how and why the data may be accessed. Vice President and Chief Information Security Officer at Intel explains in more detail the significance of trust and avoiding security breaches.Read what he has to say.
You may want also to take advantage of our coming webcast to see how industry peers are doing to solve the very challenges Cloud adopters face. Tune in to a webcast on December 6 at 9:00 am PST to hear from Cisco UCS customers Xerox and FICO Corporation, about how and why they used it in their Cloud environments.
Time flies! I’m off to the Gartner Data Center conference in London again. And as per last year, I’ll drive my this ancient and very historical Bothwell Castle on my way to the airport.
Last year I was very busy at the Cisco stand in the Solution Showcase. This time, I’m spending all of my visit in the actual conference sessions, learning about top concerns and trends in the data center world, and I plan to tweet out some of the most interesting and controversial learnings, as well as following up in subsequent blogs here. So follow me on Twitter @StephenSatCisco to learn what is surprising me (and I’ll use hashtags #CiscoDC #GartnerDC. And if you are at the conference, I should be near the Cisco stand at the breaks so drop by and say hello!
If you were not able you visit with us in Denver, take a look at the following videos and resources for more information on the demos we featured in the Cisco booth.
Mobile Collaboration with WebEx Web Conferencing
Teach, learn and collaborate from anywhere with WebEx on your iPhone, iPad or Android device. Meet face-to-face with new 2-way group video. Listen as Nancy Crouch, Deputy CIO, details how Wake Forest University extended collaboration with a campus-wide WebEx license.