With the growing influx of new mobile devices, connected things, bandwidth intensive applications and more data, the network is more relevant to business success than ever before. Back in June of 2012, Cisco saw that we needed to move away from multiple network systems loosely linked together to an agile and simple infrastructure, streamlined policy and centralized management would be needed to support new business demands. We called it Cisco Unified Access and we aligned the solution to three pillars: One Network, One Policy and One Management.
For the last few years, we have focused on delivering new products and functionality under this Unified Access model. Below is a timeline of products released as part of the Unified Access framework. Cisco lead the way in delivering gigabit 802.11ac Wi-Fi., converged wireless control in access switches and through the acquisition of Meraki – a complete cloud-managed network solution.
The timeline above doesn’t represent every feature and function we have delivered, but it shows Cisco’s commitment to this Unified Access model, both from a cloud-managed and on-premise solution perspective.
Today, Cisco is announcing a number of new products and new functionality to existing products that will help mobilize the workforce, secure the business and increase IT agility. The announcement includes the following: Read More »
Tags: #80211ac, 11ac, 802.11ac, access, access point, Agile, agility, Aironet, anyconnect, AP, App, application, asr, bandwidth, business, byod, Cisco, compliance, converge, converged, Converged Access, data, device, emm, employee, Enterprise, experience, feature, foundation, function, gigabit, Guest, guest access, HD, HDX, high density, identity, indoor, infrastructure, interop, ISE, ISR, IT, LAN, lifecycle, Manage, management, MDM, meraki, mobile, mobility, model, network, operation, outdoor, policy, portfolio, prime, Prime Infrastructure, product, secure, security, services, simple, simplify, system, System Manager, technology, traffic, unified access, vpn, WAN, wi-fi, wifi, wired, wireless, wlan, workforce
Cisco IT has always strived to improve the user experience. It is often overlooked in some IT organizations, but Cisco IT has service managers who are held accountable for the feedback they get for their service sectors. This focus on how we perform means we are constantly pushed to improve how users interact with the technology. Read More »
Tags: Cisco IT, cisco on cisco, coc-enterprise-networks, coc-security, Guest Account, ISE, security
The industry is going beyond BYOD—it’s not just about simply connecting the device anymore: the mobile landscape has grown to include apps, devices and content, all of which require security and management. This is no easy task. Enterprise mobility management (EMM) is no longer a nice-to-have for our customers—it is a necessity. You need a mobile strategy.
We at Cisco have been steadily building out our mobility portfolio across infrastructure, policy and management over the past few years to provide our customers with what they need to get ahead of the mobile trend.
It has always been Cisco’s strategy to use open API’s with ISE to integrate with host of 3rd party EMM vendors, including Citrix, MobileIron, Airwatch and many more. We are now extending that flexibility to create a cloud-managed EMM offering with our Cisco Meraki solution. The latest addition to the Cisco mobility portfolio, the Cisco Meraki Systems Manager Enterprise is an evolution of Cisco Meraki’s existing MDM cloud offer, and a natural extension of the Cisco Meraki network management solution (e.g. extending management of wireless access points to the management of devices connecting to the enterprise domain).
Cisco is committed to customer choice, and will continue to offer different options to the market, including ecosystem EMM partner solutions. The addition of the Cisco Meraki Systems Manager broadens that portfolio to strengthen our offering and empower our customers attain the mobility solution best suited for their specific requirements.
For more information on the Cisco Meraki Systems Manager, read the full announcement blog here.
Tags: 3rd party, access point, AirWatch, API, App, application, byod, citrix, connect, content, customer, device, emm, Enterprise, Identity Services Engine, infrastructure, ISE, Manage, management, market, MDM, meraki, mobile, mobile device, MobileIron, mobility, network, partner, policy, portfolio, secure, security, solution, system, systems manager, trend, vendor, wi-fi, wifi, wireless
When it comes to delivering better business outcomes, many IT people could be sitting on a virtual goldmine – particularly when it comes to location analytics. Here are some new ways that you can extract more of that valuable information from your network, and some things to think about as you add new services and capacity.
Smart mobile device users are always looking to access information as they enter any public or private space. If you oversee IT for a shopping center, a hotel, a university or some other large venue, you know that every mobile device user can be an opportunity to:
- Engage customers in new ways: Deliver relevant content, information, and services directly to customer’s mobile devices based on their location or personal preferences.
- Understand customer behavior: Many organizations are not able to efficiently track the number of visitors, dwell time, or movement patterns. Imagine how much you could address visitor needs by gaining these insights.
- Create new advertising revenue streams: Monetize your Wi-Fi infrastructure through third-party mobile advertising opportunities and mobile-influenced sales.
How can you make the most of this opportunity and connect with visitors to improve experiences, increase customer loyalty and drive sales?
Read More »
Tags: cmx, connected mobile experiences, Edu, Identity Services Engine, ISE, IWAN
In the past, a critical component of preventing threats was understanding and controlling network access and access to network resources based on role, while also denying access for unauthorized users and devices.
However, assuring this secure network access has been increasingly difficult due to:
- Complexity in understanding more than just who, but how, by what, when and from where users and devices attempt to access network resources
- Complexity in connecting authorized users to needed services with the explosion of both on premise and remote devices used by a single user
- Complexity in evolving network architectures where networks have become more “flat” and difficult to manage from a security standpoint
- Complexity in unifying the number of disparate security systems that need to be configured, managed and visualized
These various aspects of security complexity challenge security practitioners with delivering the right services and purchasing the right solutions to not just handle the complexity, but also reduce it. However, when we take a look at IT security spending, where does the majority of investment go and where do most vendors siphon their money to and why?
If you look across the entire attack continuum, there are three phases that people need to focus on when dealing with threats and attacks: before an attack happens, during the time it is in progress, and even after the damage is done. To properly protect against threats in all stages, organizations need to reinvestigate their security to gain visibility and control across these three phases in order to truly reduce risk.
Read More »
Tags: ISE, network access, security