Cisco Blogs


Cisco Blog > Enterprise Networks

Your Network: Well-Kept Secret for Your Protection?

July 22, 2014 at 10:29 am PST

In my discussions with security executives who gathered at the recent Gartner Security Summit they recognized that unsecured access to the network is a critical threat vector.   However, when leveraged properly, the network itself also provides a significant platform that offers comprehensive protection to close those gaps. What does this mean?

Read More »

Tags: , , ,

Third Time’s A Charm: Cisco is a Leader in the Gartner Magic Quadrant for Wired and Wireless LAN Access Infrastructure Again!

Gartner has released their 2014 Magic Quadrant for Wired and Wireless LAN Infrastructure.  For the 3rd year in a row, Cisco is recognized as a leader in both vision and execution.  We believe this Gartner recognition is validation of Cisco strategy and investments for unified access, policy management and cloud managed solutions.

Cisco’s position in the Wired and Wireless Gartner MQs has been consistent over the past 3 years as the market landscape has shifted we believe validating our commitment to meeting shifting customer priorities and requirements.

Qartner Magic Quadrant 2014
This graphic was published by Gartner, Inc. as part of a larger research document and should be evaluated in the context of the entire document. The complimentary copy of the Gartner document is available to view here.

The 2014 Gartner Magic Quadrant for the Wired and Wireless LAN Access Infrastructure (Authors: Tim Zimmerman, Andrew Lerner, Bill Menezes; Published 26th June 2014) reflects the evolution from prior years and highlights what customers are looking for:

With limited growth in IT resources, administrators require one network management application, one access security solution, one guest access application or one policy enforcement solution with the flexibility to be deployed in a public cloud, private cloud or on-premises. This integration reduces the costs associated with the upfront capital expense of multiple network service applications each dedicated to either the wired infrastructure or the wireless or cloud components. This savings is also extended to the ongoing software maintenance costs of all access layer management, security and policy enforcement components.”

What Does Being a Leader Mean?  Read on for the full story Read More »

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

How Cisco IT Delivers a Robust PaaS for Application Developers

The faster internal applications can be developed and deployed, the sooner they will deliver benefits for the business. That’s an easy statement to understand, but not so easy to bring to reality. Read More »

Tags: , , , , , , , , , , , ,

Indoor WiFi Location and Beacons: Better Together

wifibeaconIn just two years, indoor location technology has taken off and attracted a lot of buzz across industries, from retailers to healthcare. But it’s no longer a conversation about just Wi-Fi – the introduction of beacon devices, including iBeacon, has added a new dimension to location technology for IT and their line of business counterparts to grapple with on how to leverage it to better reach their customer base.

Some customers have been asking about beacon technology and how it fits in with Wi-Fi, so let’s start from the beginning:

How do beacons work?

Beacons are sensors that send out Bluetooth low energy (BLE) tracking tags.  These sensors can be placed around a venue, such as a store, and a mobile device can pick up the BLE signal and determine that it is in close proximity. When a mobile app is built off of this technology, it can be used in interesting ways to interact with the end user, such as notifying a customer of a promotion for an item they are close to.

I’m having trouble differentiating Wi-Fi and beacons. What do I need to know? Read More »

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

Score for IT this World Cup

Unless you’ve been living under a rock for the last two weeks, you know that the FIFA World Cup is in full swing. Stakes are higher than ever as we move into the semi-finals with more and more people tuning in to cheer on their favorite futbol teams. In fact, FIFA just released a media release yesterday about how this year’s 2014 FIFA World Cup™ has set new records for streaming data traffic around the world. My colleague Ido blogged about IWAN helping with the bandwidth overload caused by the FIFA World Cup last week, so let’s dive deeper and talk about video and high density.

There is no denying it: your employees and customers are streaming video. While the volume of that streaming dramatically peaks around game times during the World Cup, it should be no surprise that today, mobile applications, largely video, are increasing mobile traffic across networks. That’s straight forward: apps + video = bandwidth drain. Combine that with the fact that people are touting multiple devices--think a laptop and a smartphone, maybe a tablet, too. This means high density--lots of clients and devices on a single network. These circumstances trigger three potential yellow cards to cross an IT person’s mind – let’s see how we can avoid them.

YELLOW CARD #1: Rich Media Optimization

As an end-user, the common expectation is that I should get the same crisp, clear, rich  media or video experience across all platforms—I don’t care if it’s my phone, my tablet or my laptop: make it high definition. This is harder said than done.

It is not easy to provide the same rich media experience across wired and wireless devices. Traffic from wireless devices has to travel all the way back to the controller in a data center and then back to an access switch before reaching its destination. It’s called the hairpin effect. The result is that video over Wi-Fi could look grainy. That won’t do for the current generation of high definition junkies. Read More »

Tags: , , , , , , , , , , , , , , , , , , ,