Cisco Blogs


Cisco Blog > The Platform

Next Gen IT Predictions: 2014 and Beyond

In my travels, I am fortunate to see new and interesting innovations, emerging technologies and trends. Of course, the growth of mobile and cloud technologies continues to shape our work and lives. 2014 will be a year that builds on the momentum of these trends, along with IoT, with more connected people, processes data and things than ever before.  Here’s my take on the most significant things we’ll see in 2014.

Next Gen IT Predictions : 2014 and Beyond from Cisco Business Insights

 

1. Increasing urgency to manage our zettabyte-driven world.

The proliferation of mobile devices, streaming video and explosion of applications has meant that global IP traffic has exploded more than 4x in the past 5 years. IP traffic will again triple over the next 5 years. In 2013, we generated a momentous 1.2 zettabytes of new information and 70 billion apps were downloaded. Wireless traffic will exceed wired traffic and video-on-demand traffic will nearly triple in three years.

Read More »

Tags: , , , , , , , , , , , ,

Securing the Future Enterprise

This blog post is part three of a three-part series discussing how organizations can address mobile security concerns through an architectural approach to mobility. The first post discusses how next-gen Wi-Fi models will pave the way for secure mobility. The second post highlights the risks versus the rewards of mobility.

Providing corporate network access via mobile devices is nothing new to today’s IT administrators. However, the future of BYOD and mobility will change as rising generations expect and demand more seamless and secure connectivity. Recently Tab Times editor Doug Drinkwater shared a similar idea: BYOD is still in an early phase with plenty of new challenges and opportunities ahead.

In this last installment of this security and mobility series, I’ll discuss why BYOD policies will change and outline how C-level executives can leverage employees as solution drivers in order to solidify the future of mobility within their organization. Read More »

Tags: , , , , , , , , , , , , , ,

Mobile Security: Is the Risk Worth the Reward?

This blog is part two of a three-part blog series discussing how organizations can address mobile security concerns through an architectural approach to mobility.

In my first post of this three-part series, I discussed how next-gen Wi-Fi models will pave the way for secure mobility and the value of secure Wi-Fi. In this post I’d like to take the mobility conversation a bit further and outline potential risks and rewards that IT departments face when deciding to deploy mobility solutions in our Internet of Everything (IoE) landscape.

A big factor for IT to adopt a mobility strategy with new technology and solutions is weighing the practical risks versus the rewards they stand to gain. A recent ISACA survey of IT professionals offered insight into how employed consumers think and act in terms of security and mobility. The study and ISACA’s 2013 IT Risk/Reward Barometer reveal:

  • Only 4% of those surveyed named the makers of their mobile phone apps as the entity they most trust with their personal data
  • 90% don’t always read privacy policies before downloading apps to their devices

Most of us are familiar with the rewards of mobility, but the belief and behavior gap illustrated by the ISACA survey proves we need to better understand risks of mobility. Read More »

Tags: , , , , , , , , , , , ,

Summary: An Innovative Infrastructure to Capture the Value of the Internet of Everything

The Internet of Everything (IoE) is no longer a prediction. It is reality. As I think about the infrastructure needed to truly capture its value, I immediately think the network needs to be:

  • Agile
  • Intelligent
  • Secure

Why are these qualities a necessity for a thriving programmable infrastructure? Simply, it will allow enterprises to be ready for today’s business needs and tomorrow’s new business models.

Business Insights 12 11 13

Organizations must be able to quickly, intelligently and securely leverage their infrastructure to keep pace with business transformation driven by emerging cloud and mobile technology.

Today’s world is dominated by what Gartner Vice President David Cearley calls the “four powerful forces: social, mobile, cloud and information.” An infrastructure must increasingly demonstrate it can add value to the business, by rapidly and securely rolling out new services, apps and capabilities in a connected world.

Read the full article:  An Innovative Infrastructure to Capture the Value of the Internet of Everything

Tags: , , , , , , , , , , ,

An Innovative Infrastructure to Capture the Value of the Internet of Everything

As the saying goes, the constants in life are death and taxes. We all know there are more than those two, including change and its counterpart, disruption. Business success will result from responsiveness and adaptation that will happen at a rate and with intelligence that we’ve only begun to get our heads around.  And, most CIOs I speak with are asking about how they can adapt and scale their infrastructure to be prepared as the Internet of Things evolves into the Internet of Everything.

Learn how your infrastructure can be intelligent, flexible and secure during constant business transformation. Click on each interactive tile to discover relevant facts.

Learn how your infrastructure can be intelligent, flexible and secure during constant business transformation. Click on each interactive tile to discover relevant facts.

This change brings big implications for IT. The role of IT is changing, in the face of cloud and mobile apps, and the growing understanding that every company is a technology company. From the consumerization of IT to what Gartner Vice President David Cearley calls the “four powerful forces: social, mobile, cloud and information,” IT must increasingly demonstrate it can add value to the business, by rapidly and securely rolling out new services, apps and capabilities in a connected world.

Read More »

Tags: , , , , , , , , , , , ,