Cisco Blogs


Cisco Blog > Collaboration

Taking All the Right Steps for Customers

Cisco Receives Recognition from Top Analyst Firms

As we start a new fiscal year, I’ve been reflecting on the year we’ve just completed – particularly as it relates to video collaboration.  We delivered innovation across our portfolio that enables customers to enjoy a seamless video experience from the browser to the boardroom. And the latest set of analyst reports validates this.

My greatest satisfaction, of course, comes from our customers.  But when industry watchers also take notice, it has a really nice ring. In each of the latest video reports from these top analyst firms, Cisco is recognized and evaluated:

I believe this recognition is testament to our no-compromise strategy: Make video collaboration simple and delightful Read More »

Tags: , , , , , , ,

Third Time’s A Charm: Cisco is a Leader in the Gartner Magic Quadrant for Wired and Wireless LAN Access Infrastructure Again!

Gartner has released their 2014 Magic Quadrant for Wired and Wireless LAN Infrastructure.  For the 3rd year in a row, Cisco is recognized as a leader in both vision and execution.  We believe this Gartner recognition is validation of Cisco strategy and investments for unified access, policy management and cloud managed solutions.

Cisco’s position in the Wired and Wireless Gartner MQs has been consistent over the past 3 years as the market landscape has shifted we believe validating our commitment to meeting shifting customer priorities and requirements.

Qartner Magic Quadrant 2014
This graphic was published by Gartner, Inc. as part of a larger research document and should be evaluated in the context of the entire document. The complimentary copy of the Gartner document is available to view here.

The 2014 Gartner Magic Quadrant for the Wired and Wireless LAN Access Infrastructure (Authors: Tim Zimmerman, Andrew Lerner, Bill Menezes; Published 26th June 2014) reflects the evolution from prior years and highlights what customers are looking for:

With limited growth in IT resources, administrators require one network management application, one access security solution, one guest access application or one policy enforcement solution with the flexibility to be deployed in a public cloud, private cloud or on-premises. This integration reduces the costs associated with the upfront capital expense of multiple network service applications each dedicated to either the wired infrastructure or the wireless or cloud components. This savings is also extended to the ongoing software maintenance costs of all access layer management, security and policy enforcement components.”

What Does Being a Leader Mean?  Read on for the full story Read More »

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

The World Cup, Piano Movers, and IVR

As I write this, it’s World Cup time, reminding me of an old saying that in football (or soccer, as we Americans call it) there are two types of players: piano players and piano movers. Piano players perform magic with the ball. They score most of the goals … and get the big endorsement deals. Piano movers, on the other hand, toil in relative anonymity. They don’t win many style points, but they get the job done.

In some ways, Interactive Voice Response (IVR) is a lot like being a piano mover. IVR is a mature, reliable, technology that’s often used to provide automated self-service to callers as a front-end to a contact center. IVR has minimal “wow” factor, and in fact it’s occasionally derided (typically due to bad application design). Yet more businesses are using it now than ever, because IVR is still one of the most cost effective ways to provide customer service.

People are often surprised when I tell them that Cisco is the world’s #1 IVR vendor--by a wide margin. Some of the world’s largest, most mission-critical IVR systems are built on Cisco. Moreover, Cisco was recently honored to receive a “Strong Positive” rating (the highest level) from Gartner in their annual IVR Marketscope report. In particular, Gartner noted Read More »

Tags: , , , , , ,

The Expanding Burden of Security

July 8, 2014 at 6:00 am PST

[ed. Note: This post was updated 7/9/2014 to include new information not available to the author at the time of original publishing]

I just returned from the Gartner Security Summit at the Gaylord Resort in National Harbor Maryland. Each morning I took my run along the Potomac River and passed this sculpture of a man buried in the sand.

KT_sandman

In speaking with many IT executives they expressed specific concerns around their IT security, and this sculpture of the “man in the sand” took on new meaning for me. I could see how they might similarly feel overwhelmed and buried given their limited resources and the abundance of threats to their environments. Yes, I’ve been in this industry too long! Anyway, throughout all of my conversations it was abundantly clear that people were looking for a new way to approach securing their networks and applications. Customers are recognizing that unsecured access to the network is a critical threat vector; however, when leveraged properly, the network itself also provides a significant platform that offers comprehensive protection to close those gaps. So, what do I mean by that?

The network uniformly sees and participates in everything across the threat continuum, whether before, during or after an attack. If we can leverage the insights and inherent control the network provides, IT organizations can truly augment their overall end-to-end security across this continuum. If done correctly, this augmentation can happen without investing a large amount of time, energy, and resources in filling all the gaps to secure their environments -- regardless of legacy network, endpoint, mobile, virtual, or cloud usage models

Cisco strongly believes that the network must work intimately with various security technologies in a continuous fashion to offer protection for networks, endpoints, virtual, data centers and mobile.

The New Security Model

Given Cisco’s breadth and depth of security, we did not have room to exhibit our networking devices. However, within much of our networking (and even security) offerings, we have embedded security capabilities that provide more comprehensive protection across the entire threat continuum.

An example of this is Cisco TrustSec embedded network access enforcement, which provides network segmentation based on highly differentiated access policies. Cisco TrustSec works with Cisco ISE to provide consistent secure access that is mapped to IT business goals. Cisco ISE and TrustSec are part of the Cisco Unified Access solution and leverage a superior level of context and simplified policy management across the entire infrastructure in order to ensure that the right users and devices gain the right access to the right resources at any given time.

Cisco’s integrated approach to security reduces complexity, while providing unmatched visibility, continuous control and advanced threat protection, which, in turn, allows customers to prioritize more efficiently and act more quickly - before, during, and after an attack. Through Cisco’s New Security Model, we help you achieve a more pleasant experience and get you dug out of the sand. To learn more and go beyond just a shovel and pail, go to Cisco’s Security Page.

Tags: , , , , , , , ,

IT Needs a Promotion to Cloud Services Broker

 

How can leaders manage the transition to a cloud services broker? Check out the new Gartner newsletter to learn more.

How can leaders manage the transition to a cloud services broker? Check out the new Gartner newsletter to learn more.

Is your IT department currently acting as a Cloud services broker?And what exactly is a Cloud services broker?

As our world of many clouds continues to evolve, increased opportunities exist for IT departments to move from the traditional “siloed” working environments to play a more critical role in corporate planning strategies.

Aligning IT and business objectives are duties handled by an IT services broker, who is usually the company CIO.

This role has become increasingly recognized as IT-as-a-Service (ITaaS) becomes a piece of the intercloud fabric.

The time is now for corporations to begin viewing their IT departments as more than the group that resets passwords and helps new-hires with their computer set-ups.

 

In order to manage the cloud transition and embrace the role of cloud services brokers, CIOs and IT leaders should consider these five steps:

1) Develop your future thinking and let go of the idea of how your IT department has done things in the past and think about what processes can be reengineered or what new capabilities need to be developed. Your IT group is best able to identify technology gaps in an organization’s processes as CIOs contend with hybrid cloud environments.

2) Create your Infrastructure-as-a-Service (IaaS) Building Block and ensure it’s agile, so your IT department can manage infrastructure services in a highly automated fashion and deliver to users in just minutes. By enabling a hybrid cloud environment in the IaaS layer, IT can more easily play the role of cloud services broker.

3) Add the Platform-as-a-Service (PaaS), which uses the agility in the IaaS foundation. Ultimately, this delivers greater efficiencies and flexibility in the deployment and deployment of cloud workloads. Without PaaS, development and testing of initiatives would require dedicated capacity to be allocated by IT.

4) Ensure required security standards. The SaaS and Infrastructure Security building block is where IT’s ability to serve as a cloud service broker plays a critical role and for an organization’s integrity, cloud-based services are best managed by them as a one cohesive infrastructure.

5) Make your vision a reality and implement transformational change! Now that you’ve assembled all the necessary building blocks, find a trusted partner to help you define and implement your vision. Tools like Cisco Domain Ten can help your IT department create evaluation criteria that helps them play their role as cloud services broker.

Additional Resources:

If you want to learn more about how to prepare for growing cloud workloads, how to evolve your IT department to harness the true potential of the cloud, and how to develop a more strategic approach to IT operations and service management, be sure to :

Watch the Cisco Intercloud Workload Migration Webcast (Available on demand).

Cisco Live, May 18-22

or follow the conversation online @CiscoCloud with #CLUS and #CiscoCloud.

Watch the Cisco Live Opening Session and Keynote by John Chambers on Monday, May 19 at 3:30 p.m. PDT.

Watch the Cisco Live Technology Business Vision  keynote by Rob Lloyd on Tuesday, May 20 at 10:00 a.m. PDT.

Register today for the Cisco Powered Cloud Day at Cisco Live on Monday, May 19. The insightful day will focus on opportunities and challenges that can be addressed with cloud.

Watch the Cisco Live Cloud Technology Trend Keynote – Aligning Your Strategy and Business for Cloud Success by Dr. Gee Rittenhouse and Faiyaz Shahpurwala on Tuesday, May 20 – 1:30 p.m. PDT.Visit

Cloud Executive Perspectives to get additional cloud insights for IT leaders.

 

Tags: , , , , , , , , , , , , , , ,