During this free event, you will learn about the new features that provide increased scalability, reliability, and ease-of-use for guest access and BYOD on-boarding. You will hear from customers who have already deployed the 1.2 release. And we will discuss how the enhancements provide significantly greater capabilities than solutions available from competing vendors.Whether you need to support BYOD work practices, or provide more secure access to your data center resources, the Cisco Identity Services Engine (ISE) can help. With this all-in-one enterprise policy control platform, you can reliably enforce compliance, enhance infrastructure security, and simplify service operations.
In today’s world, we are always on the go and want to communicate and collaborate wherever and however we choose to live, work, and play.
We are seeing this mobility trend emerging with more of our customers, as they realize they need their employees to be able to effectively work across their different devices while on the road or in different office locations. And just being able to connect isn’t enough. There must be really good quality not only in audio, but also increasingly with video and application sharing.
The latest version of Cisco TelePresence Server (v3.1) has been developed with these customer needs in mind. Organizations can now better enable their employees to collaborate face to face while on the move, with new video capabilities that improve the user experience from any endpoint:
Flexibility with ActiveControl: Users can be more engaged with a higher level of user control of meeting layouts.
Video quality with Cisco ClearPath: Over highly lossy public networks – even at packet loss rates of 20% – ClearPath delivers a clear video experience. Watch this video to see the difference ClearPath makes in quality:
Under the same network packet loss conditions, the left screen is the video experience without ClearPath; the right screen is the clear experience with ClearPath.
Are you a mobile worker, or have a mobile workforce? We’d like to hear from you. What do you expect and need from video for great collaboration?
Whether you need to support BYOD work practices, or provide more secure access to your data center resources, the Cisco Identity Services Engine (ISE) can help. With this all-in-one enterprise policy control platform, you can reliably enforce compliance, enhance infrastructure security, and simplify service operations.
By Carlos Cordero, Cisco Consulting Services, Service Provider
Cloud consumption models are gaining traction across all company sizes and industries. Whether software as a service (SaaS), infrastructure as a service (IaaS), or platform as a service (PaaS), the value propositions of virtualization are being sought by IT decision makers.
Cisco Consulting Services sees an opportunity for network service providers (SPs) to deliver a similar experience through a new solution architecture that we call network as a service (NaaS). NaaS does for the network what SaaS and IaaS have done for the data center — offering many of the same value proposition components, such as lower OpEx and increased agility, as well as new business model levers and distribution benefits.
A Simple NaaS Architecture Delivers Broad Benefits
To illustrate the value, this paper focuses on NaaS for mobile operators, although similar value could be articulated across all SP segments. Today, the various engineering and operational functions required to enable new customers, new services, and repairs are buried behind monolithic and independent network elements. The goal of NaaS is to simplify the architecture through virtualization, bringing disparate software solutions onto common hardware.
At the heart of mobile NaaS is an intelligent core with the service elements needed to deploy mobile data services (Figure 1). Traditionally, each software element runs on dedicated hardware, but under NaaS, these elements are separated so the software can run on shared virtual machines. The model also includes a common storage and compute infrastructure that can be delivered to the intelligent core as needed through a virtual machine approach. The intelligent core should work across a variety of licensed and unlicensed access technologies, shown at right. The active service catalog represents the SP’s ability to create unique service environments by combining service elements in an automated and simplified way. Finally, the secure portal enables consumers and business customers to access and manage their own network instances.
Figure 1. Mobile NaaS Is Anchored in a Flexible and Extensible Set of Service Elements. Read More »
In this blog series, we’ve discussed two important steps enterprises can take unleash the power of enterprise mobility. We’ve covered how building a mobile structure can arm enterprises with the appropriate architecture to increase efficiency and revenue. In addition, we highlighted how enterprises can go virtual by implementing desktop virtualization.
Our third step -- preparing for the division of devices -- relies on both structure and a mobile workforce. How can enterprises enable and support the proliferation of employee-owned devices without burying their IT department and putting corporate data at risk? Here’s a quick checklist to help make it happen:
1. Use a unified network infrastructure that facilitates secure, virtual workspace delivery across wired, wireless, VPN, and cellular networks.
As wireless access becomes more pervasive, performance and reliability expectations are the same as what is expected from a wired network. Features such as reliable connectivity, application response times and voice, video and real-time collaboration solutions all depend on a seamless delivery for both wired and wireless devices. This fundamental shift demands that IT monitor and have a unified solution in place (i.e. a single physical infrastructure) for both corporate wireless LAN (WLAN) and wired LAN. This converged infrastructure will enable the right quality of experience for users, independent of their devices.
A unified network infrastructure can also make sure that IT is able to identify each device connecting to the network and authenticate the person using it.