Cisco Blogs


Cisco Blog > Mobility

Cisco’s 802.11ac Portfolio Expands with the New Cisco Aironet 2700 AP

As a Product Manager there is some anxiety but more of an excitement around introducing a platform to the market. Today I am proud to be part of Cisco team that is  bringing to market the Cisco Aironet 2700 Series Access Point.  What it offers is a tremendous amount of power at a very attractive price point.  

2700

We all know Wi-Fi is here to stay and is expanding all around us rapidly. That need for speed is exciting.  But what does that mean? Not everyone feels comfortable being on the cutting edge. Many of our customers are not as concerned about chasing the future and have more limited budgets that they hesitate to put down for the best AP knowing there are lower priced options.  At the same time, everyone is aware technology moves ahead with or without you, so they don’t want to give up lot of the new capabilities by going totally to the other extreme of not upgrading at all.  What they want is something that’s going to last for a while that gives them the advantages available today, but not have to invest a lot to get it. I equate this to buying something like a car.  A year ago when I was in the market to buy a new car I didn’t want to sacrifice whole lot of options but if there was one or two options that I could give up in order to save a bit of money, I was okay with that.

This is similar to what Cisco is offering with Aironet 2700 Series.  Customers have to choose something that they can utilize in their network that is better than any of the competitive solutions out there, truly built-for-purpose, sleek design on the outside yet tough on the inside and very powerful. Read More »

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

Not All 802.11ac AP’s are Created Equal: Built-for-Purpose vs. Purpose-Built

As more and more 802.11ac devices come to the market this year, businesses need to make sure the best possible 802.11ac wireless infrastructure gets deployed to make sure those 802.11ac end points are performing at both the best possible data rates and application throughputs to maximize the move to  802.11ac.

Cisco’s Aironet 3700 with HDX Technology does just that. If you’re thinking that the 3700 is just another 802.11ac AP,  think again: not all 802.11ac AP’s are created equal.

To demonstrate this, let’s take a Cisco 3700 access point..

3700internal1

When you open a Cisco AP, you will see dedicated memory (RAM) on the radio chipset itself (one on the 2.4 GHz radio, another on the 5 Ghz radio) to ensure the RF packets get processed “onboard” each radio instead of “offboard” in order to reduce latency and any packet processing collision from memory contention on the AP. Additional packet processing can be handled  on the “offboard” memory that is part of the network processor portion of the AP platform as well. This unique, innovative ASIC-based Wi-Fi chipset by Cisco exemplifies the built-for-Purpose design, and is the hallmark of Cisco’s 3700 Series AP.

3700internal2

Contrast this with the competitive landscape that claims to be Purpose-Built, but in reality is leveraging off-the-shelf merchant silicon-based 802.11ac WiFi chipsets. Read More »

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

Summary: Navigating Security Threats in a Mobile World

Security plays an important role in the success of mobility implementations worldwide. We assume security threats are always present, however it’s not always apparent where threats may arise from. Being aware of these potential risk areas is crucial.

Business decision-makers must gain insight into where these breaches are occurring. They should also understand why it is important for them to care, and how they can be aided by technical decision-makers to solve these issues moving forward.

Here’s a brief look into the where, the why and the how of embracing a secure approach to enterprise mobility and what it means for business leaders.

Cisco_NavigatingSecurityMobileWorld

Where are security threats? Today’s organizations are facing a greater attack surface as advanced mobile devices and public cloud services foster new attack models and increasing complexity within networks. To cover the entire attack continuum, organizations need to address a broad range of attack vectors with solutions that operate everywhere the threat can manifest itself: on the network, on traditional endpoints, on mobile devices, and in virtual environments.

How can threats be thwarted? The best approach is a proactive one, rather than a reactive one, especially when many organizations may not know when they are under attack. Business leaders must work with IT teams to institute a formal program for managing mobile devices and to ensure that any device is secure before it can access the network.

Why does a balanced approach to mobile security matter? In a recent blog post, I discussed the need for organizations to deploy a balanced approach to mobile security. This approach should focus more on protecting the network and proprietary data and less on implementing overly broad restrictions. IT needs to approach security with a user experience mentality. After all, if you overly manage devices, your adoption will be low and so will your return on investment (ROI). This approach can lead to greater opportunities to align threat intelligence and security best practices.

To learn more about this balanced approach to mobile security, read the full blog: Navigating Security Threats in a Mobile World.

Tags: , , , , , , , , , , , , ,

Navigating Security Threats in a Mobile World

Security plays an important role in the success of mobility implementations worldwide. We assume security threats are always present; however, it’s not always apparent where threats may arise from. Being aware of these potential risk areas is crucial.

Since mobility solutions offer users the ability to use devices on a range of networks and in a wide array of places, threats may come in unsuspected ways, or be inadvertently introduced into your enterprises network. For example, one recent study reveals that 80 percent of corporate security professionals and IT leaders recognize that “end user carelessness” constitutes the biggest security threat to an organization.

In addition, information from the Cisco 2014 Annual Security Report sheds light on the persistent security attacks that enterprises face. From hackers to malicious malware, it’s clear that security threats arise from unsuspecting places.

Given this knowledge, business decision-makers must gain insight into where these breaches are occurring. They should also understand why it is important for them to care, and how they can be aided by technical decision-makers to solve these issues moving forward. In this post I’ll discuss the where, the why and the how of embracing a secure approach to enterprise mobility and what it means for business leaders.

Read More »

Tags: , , , , , , , , , , , , ,

Network Programmability Is Real: Five Use Cases for Our Disaster Recovery Cloud Services

SunGard AS has more than 9000 enterprise customers who count on our cloud services and managed services when disaster strikes. Lately, we’ve seen that the “Internet of Everything” is changing customer expectations. Our customers want new types of cloud services—and they want them sooner. They’re also asking to provision and control the services on their own. To keep delivering new products and services, we need a network that’s more flexible, intelligent, secure, and agile than ever before.

Our strategy for the future is to create a platform for service agility by enabling network programming. This is a radical change for our business and our customers. Not having to wait for engineers to program the network will help us bring new services to market sooner. Network programmability will also make it possible to offer new self-service options our customers are requesting, like bandwidth calendaring and service on demand. Read More »

Tags: , , , , , , , , , , ,