Founded in 2007, RetailMeNot.com is the largest digital coupon site in the US. They help hundreds of thousands of customers save money when shopping online. They are headquartered in Austin Texas, in the hip “Live Music Capital of the World”. Since the company went public in 2013, the company has doubled the number of employees from 250 to over 500.
In previous blogs, I have covered what is AVC, SuccessEHS and how Plixer’s Scrutinizer accepts Netflow, sFlow and IPFIX exports. This post will cover how these key products are combined by RetailMeNot in their WLAN deployments to optimize and support this fast growing company.
Recently Michael Patterson, the Founder and Product Manager at Plixer, Matthew St. Jean the Marketing Manager at Plixer and I had an opportunity to talk to Tim Tyndall, the Lead Network Engineer at RetailMeNot. Tim shared with us the highlights of the wireless LAN deployment and explained how they use Cisco Application Visibility and Control and Plixer’s Scrutinizer to stay in control of how their WLAN is being utilized.
Tim described the environment and culture that has become a huge part of the company’s success. RetailMeNot provides hip new offices for its employees with open work spaces and other awesome perks.
The Cisco powered wireless network supports this initiative. In fact, nearly all network connectivity is wireless. He said that employees are issued a laptop by the company and many carry in their own smartphones and tablets as well; Most of those devices being from Apple.
Employees can roam freely with reliable service that spans the company’s five floors. Even during large meetings where access density increases dramatically, service continues without any interruptions and the performance metrics they can obtain using NetFlow is exceptional and reinforce that the traffic is optimized. Read More »
Tags: application visibility, AVC, Cisco, control, export, ipfix, netflow, network, optimization, optimize, performance, Plixer, retailmenot, scrutinizer, sflow, technology, wi-fi, wifi, wireless, wlan
The University of Nevada, Las Vegas (UNLV), founded in 1957, is located in the heart of showbiz industry in Las Vegas. The school offers higher education programs ranging from business, engineering, fine arts and music, and science, and professional schools such as dental medicine and law.
The school’s mascot, Hey Reb, was recently featured on Hulu’s “Behind the Mask,” and you may recognize the Southern Gym during the dance scene between Elvis Presley and Ann-Margret Olsson in the movie Viva Las Vegas.
With over 24,000 unique WLAN users per day, 1.1 gigabytes of throughput per second, and more than 50 wireless access locations across campus providing WLAN coverage, this educational institute demands a massive Wi-Fi network.
In the previous blog, we highlighted some of the Bonjour enhancements of the 7.5 software release and the deployment of Bonjour at St. Margaret’s Episcopal School, a K-12 school. In this blog, we will describe details about UNLVs WLAN deployment, how they use Bonjour services, and give you an insight into rapid pace of innovation necessary to support this technology in the education arena. Read More »
Tags: 11ac, access point, administrator, aireOS, AP, App, Apple, application, AVC, Bonjour, Cisco, cleanair, control, controller, deployment, EFT, EFT code, freeradius, granularity, High Availability, ip, location, network, openldap, policy, release, service, SSID, standby, Stateful Switch Over, sub-second, technology, UNLV, user group, vegas, visibility, VLAN, webgui, wi-fi, wifi, wlan
As Wi-Fi continues to be the primary mode of access, enterprise Unified Communication(UC) applications usage is increasing with smartphones, tablets and laptops.
Customers are asking, is there anything I can do to prioritize Jabber or Lync traffic over others or even identify how much of the traffic is really collaboration traffic vs. other types of media. The recently introduced Wireless Release 7.6 enhances the ability to classify Microsoft Lync 2013 and Jabber with Cisco WLAN Infrastructure.
In the first blog about Application Visibility and Control over Cisco WLAN, I captured what is AVC and the capabilities included in the release 7.4. In a subsequent blog, I had captured a success story about a customer who benefited from the reliability by deprioritizing scavenger level applications as well as captured highlights of the enhancements in release 7.5. This blog captures how the release 7.6 allows popular collaboration applications to be accurately classified and prioritized as well as provides a teaser to some of the innovations that can be expected in the future.
What exact capabilities AireOS 7.6 provide ?
The protocol pack 6.3 introduced in AireOS 7.6 allows you to identify and prioritize not just Jabber but also sub-classify Cisco Jabber Audio, Cisco Jabber IM and Cisco Jabber Video. Customers may want to prioritize the Cisco Jabber Audio as the highest priority while the others may be lower priority. Similarly you can classify not just Microsoft Lync but also Microsoft Lync Audio, rtcp and Microsoft Lync Video and thereby prioritize them separately. Read More »
Tags: aireOS, App, Apple, application, AVC, beta code, certification, classify, collaboration, communication, control, controller, dropbox, ESPN, infrastructure, innovation, jabber, lync, media, Microsoft, NBAR, NBAR2, Outlook, packet size, protocol, protocol pack, qq, release 7.6, rtcp, traffic, UC&C, unified communications, user, video, visibility, webgui, whatsapp, wi-fi, wifi, wireless, wlan, WLC
Are you a security professional or IT professional just resolving the security issues with BYOD (bring-your-own-device)? Watch out, BYOD was a precursor or warm up exercise to the tsunami just hitting your shores now.
The SANS Institute just completed a survey on the security viewpoints on IoT, predominantly with security and IT professionals.
78% of respondents were unsure of the capabilities for basic visibility and management of Things they will need to secure or lack the capability to secure them.
It seems that, like BYOD, IoT is driven with minimal IT consultation. And it happens with security as an afterthought, with 46% who do not have a policy to drive the visibility and management of IoT devices.
The top security controls used today for securing IoT were 68% authentication/authorization, 65% system monitoring, and 49% segmentation. That translates into Cisco Secure Access solutions that offer superior visibility, robust intelligent platform of critical context, and highly effective unified secure access control. More importantly, this will also help the 74% that rely on manual processes for discovery and inventory of connected device (from previous SANS research).
Over half (67%) are using SIEM (security information and event management) to monitor and collect data to secure IoT. Cisco ISE (Identity Services Engine) integrates with SIEM to bring together a network-wide view of security events supplemented with relevant identity and device context. This provides security analysts the context they need to quickly assess the significance of security events. More details on the ISE and SIEM integration may be found in this new white paper: Cisco ISE Plus SIEM and Threat Defense: Strengthen Security with Context
The research rightfully points out that, of the many categories of Things, the newest category of single-purpose devices typically connected by wireless (and more likely embedded) software will be the most problematic for security. Due to this difficulty, the SANS community (61%) would like the Thing manufacturers to take more responsibility for providing security. While this is a reasonable request, the question is whether they have the expertise to do this when their focus is on the exciting new IoT market opportunities. Weigh in and tell us your outlook on securing this next wave of Things connecting to your network!
The paper on the SANS survey results is in the SANS reading room.
Tags: access, byod, control, IoT, ISE, NAC, SANS, security, SIEM
Activate the IT Transformation with Unified Access: Part 4 -- Centralized Policy, Control, and Enforcement
Wednesday, May 15, 2013 10am-11am PDT | Register Now
Don’t miss the next in line of our five-part Unified Access Webinar Series on May 15th to hear how organizations in education and healthcare rely on Cisco Identity Services Engine (ISE) to provide the identity enforcement and secure access control that allow employees, contractors, students, faculty, and guests (choose the user) to use their own devices on the network. Read More »
Tags: access, activate, authentication, central, centralize, Cisco, control, demo, device, enforcement, ISE, IT, management, MDM, mobile, mobility, network, organization, policy, secure, security, technology, wi-fi, wifi, wireless