This is part 2 in a 2-part series about our API-based architecture. Part 1 explains how we provide content as a service to sellers.
Federated identity is central to cloud computing. You can’t have a useful hybrid cloud service without it. Read More »
Tags: API, architecture, Cisco IT, cisco on cisco, cloud, cloud services, data center, identity, identity as a service, salesconnect
With the growing influx of new mobile devices, connected things, bandwidth intensive applications and more data, the network is more relevant to business success than ever before. Back in June of 2012, Cisco saw that we needed to move away from multiple network systems loosely linked together to an agile and simple infrastructure, streamlined policy and centralized management would be needed to support new business demands. We called it Cisco Unified Access and we aligned the solution to three pillars: One Network, One Policy and One Management.
For the last few years, we have focused on delivering new products and functionality under this Unified Access model. Below is a timeline of products released as part of the Unified Access framework. Cisco lead the way in delivering gigabit 802.11ac Wi-Fi., converged wireless control in access switches and through the acquisition of Meraki – a complete cloud-managed network solution.
The timeline above doesn’t represent every feature and function we have delivered, but it shows Cisco’s commitment to this Unified Access model, both from a cloud-managed and on-premise solution perspective.
Today, Cisco is announcing a number of new products and new functionality to existing products that will help mobilize the workforce, secure the business and increase IT agility. The announcement includes the following: Read More »
Tags: #80211ac, 11ac, 802.11ac, access, access point, Agile, agility, Aironet, anyconnect, AP, App, application, asr, bandwidth, business, byod, Cisco, compliance, converge, converged, Converged Access, data, device, emm, employee, Enterprise, experience, feature, foundation, function, gigabit, Guest, guest access, HD, HDX, high density, identity, indoor, infrastructure, interop, ISE, ISR, IT, LAN, lifecycle, Manage, management, MDM, meraki, mobile, mobility, model, network, operation, outdoor, policy, portfolio, prime, Prime Infrastructure, product, secure, security, services, simple, simplify, system, System Manager, technology, traffic, unified access, vpn, WAN, wi-fi, wifi, wired, wireless, wlan, workforce
I am sitting and reflecting here at the start of Cisco Live London. As I walk the halls, I continue to be amazed by the size, depth, and breadth of this event. Networking continues to grow, and thousands of people are eager to come together to see the latest. Read More »
Tags: #CLEUR, cisco live, Cisco Live London, cisco live london 2013, EIGRP, human connections, human network, identity, Identity Connector, mobility, ONE, onePK, SDN
On February 29th, Christopher Young, Senior Vice President of Cisco Security, delivered a rousing keynote address at the RSA 2012 conference in San Francisco.
The title and theme of his presentation, “Lock it Down or Free it Up?”, spoke to the dilemma organizations of all sizes face every day. Read More »
Tags: ASA, cloud, conferences, identity, IPS, malware, RSA, RSA 2012, security
In an effort to reduce costs and improve operational efficiency, organizations of all sizes have begun compressing their firewall and other security services into smaller form factors and fewer physical units. Many small and midsized companies have opted for UTMs to run all of their security on a single box. Unfortunately, UTMs have failed to deliver on their promise to deliver true multi-service security. Most UTMs do one or two things really well, but add all the other services as “checkbox” items just to say they have it. Read More »
Tags: ASA, Cisco Security, Cloud Computing, cybersecurity, data security, firewall, identity, RSA 2012, secure software, security