Cisco Blogs


Cisco Blog > Collaboration

Put People First: Using Video to Enhance Relationships

AP11495How can you make the most of every opportunity to delight your existing client base?
How do you identify new areas to expand your business?
How can you improve employee engagement?

These are just a few of the challenges that organizations face today.

Deloitte’s Human Capital Trends 2014 survey explores “two major themes underlying this year’s trends: globalization and the speed and extent of technological change and innovation.” The survey authors also describe the challenge of employee retention and engagement as — after leadership — the second-most urgent issue for the organizations surveyed.  The challenge is not simply identifying and keeping staff, but creating a “passionate and compassionate” place for them to work.

In its own survey, Virgin Media found that 78% of U.K. employees believe that companies need to offer “anytime, anywhere” work flexibility to attract and retain staff.

Therefore, with increasing globalization and the need to support flexible working environments to retain and nurture talent, we rely more on collaboration technology to build strong relationships with colleagues, customers, and partners.

Create the Environment for Good Connections

How can you ensure that employees stay connected with colleagues and with customers and partners? Read More »

Tags: , , , , , ,

A New Model to Protect the Endpoint, Part 1: Continuous vs. Point-in-Time Security

The fundamental security problem that many defenders face is securing their environment in a world of continuous change. IT environments change. Threats change. But today’s threat detection technology doesn’t change. It’s stuck in time, point-in-time to be exact.

Sure, detection technologies have evolved. The latest improvements include: executing files in a sandbox for detection and analysis, the use of virtual emulation layers to obfuscate malware from users and operating systems, reputation-based application whitelisting to baseline acceptable applications from malicious ones, and, more recently, attack chain simulation and analysis detection. But predictably, attackers fundamentally understand the static nature of these security technologies and are innovating around the limitations associated with them to penetrate network and endpoint defenses.

These point-in-time detection technologies will never be 100 percent effective and are unable to identify the unfolding follow-on activities of the attacker which require continuous scrutiny. The disconnect stems from the fact that malware is dynamic and three dimensional. It doesn’t just exist in a two-dimensional point-in-time ‘X-Y’ plot waiting to be detected, where X is time and Y is the detection mechanism. Malware exists as an interconnected ecosystem that is constantly in motion. To be even remotely effective, malware defenses have to be multi-dimensional and just as dynamic, taking into account the relationship dimension as well.

Read More »

Tags: , , , ,

Don’t Miss: [Webinar] Preparing K-12 Networks for Common Core Feb 5

If you’ve worked on a K-12 wireless network, you’ll know that one of the main customer careabouts is adapting to Common Core Standards. Online testing and BYOD places even higher demands on a high quality, high performing network. What exactly needs to be taken into consideration when designing these networks?

Join us tomorrow Wednesday, February 5 for a great, informational webinar packed with tips and tricks on how to design K-12 networks to optimize for Common Core. If you work in education IT or are a partner or network consultant that handles lots of K-12 school district deployments, this is the webcast for you. We’re starting at 10am PST and will run for about 45-60 minutes--and there’ll be a chance for you to ask questions directly to Cisco engineers.

Register here today, or read the full article: Is Your Network Ready for Common Core Standards?

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

Is Your K-12 Network Ready for Common Core Standards?

What do IT and K12 Common Core Standards have in common? Forty-five states, the District of Columbia, four territories, and the Department of Defense Education Activity have adopted the Common Core State Standards. 100% of each of these states’ schools must update their network infrastructure to support the mandated online testing capabilities. Enter district IT.

Technology is a key component when it comes to achieving the objectives of these standards. The objective is to augment the learning experience through the use of wired and wireless devices and enhance skills such as communication, collaboration, research, critical thinking and tackling problems. The mandate is computer based assessments. This promotes more personalized leaning. The students are also acclimated to use technology effectively for productive life activities in the future.

The combination of common core standards adoption with BYOD or 1:1 initiatives, results in an exponential growth in addressing endpoints, bandwidth, and security. Schools are looking to upgrade their existing networks to be able to handle the current and future requirements of these standards.

Deploy K-12 Common Core-Ready Networks 20140121 Read More »

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

Virtual desktops, virtual workspaces, voice, video, … virtual reality

Today, there is lots of buzz around the big news from Cisco and our ecosystem partners with the launch of next generation VXI validated solutions.   If you missed our launch event, you can still get all the details online via our community.

Cisco Virtualization Experience Infrastructure (VXI) delivers desktop virtualization with secure access to data, voice, and video for fixed and mobile devices.    

Pretty cool but, why is virtualization important for government agencies? 

  1. cost control, more than ever government agencies are focused on strategies to improve operational efficiency and reduce costs
  2. flexibilty, allow government workers ability to work in different workplaces, from city hall to public works, with choices of different combinations of virtual desktops, voice, and video devices including latest smartphones, tablets, and Cisco Virtualization Experience Clients (VXC)
  3. security, better security and control of information in the data center rather than distributed endpoints and with the “bring your own device” (BYOD) to work phenomenon, security is more critical than ever
  4. uncompromised, helping government agencies achieve mission objectives without compromising cost or resilience mandates

See more details below. Read More »

Tags: , , , , , , , , , , , , , , , , , , , , ,