Cisco Blogs


Cisco Blog > Data Center

Why ISVs Must Transform In SMAC Environment

In today’s era of SMAC – Social, Mobile, Analytics and Cloud based solution, Pay-Per-Use licensing and Dev Ops software development methodology, Independent Software Vendors (ISV) are facing major challenges on many fronts. ISVs strive to differentiate from their competitors and gain new customers, as well as retain existing customers and generate additional revenue from them. This shift is happening throughout the software developer market and has surfaced technological and business changes for ISVs.

Read More »

Tags: , , , , , , , , , , , , , , ,

Show Me the Retail Data

retailSuccess in retail often comes down to a counting game.  How many people pass by your store?  How many come inside?   How long do they stay?  And most importantly how many ultimately buy?

Today, the retail counting game has gotten a lot easier because we can now count devices as proxies for people, since many potential customers today, myself included, won’t leave home without their smartphone.  As soon as they enter a store, the beacon on their cell phone effectively announces its arrival to the Wi-Fi network and voilà, we have a count.

With the help of CMX Presence Analytics, these smart devices can help answer many key retailing questions with a single access point.

  • Who?
    Who is passing by the store versus coming in?  Presence Analytics uses both the cell phone’s signal strength as well as the time spent in the area to determine the number of people walking by versus in-store visitors.  Presence Analytics provides simple, quick reports on retail conversion metrics.   You can also track how often visitors return to a store in a given time period can be tracked, which can be key for customer loyalty programs.

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

Midsize Auctioneer’s Network is Fast and Fortified as Hundreds of Clients Bid Billions

Forget the best of both worlds. Ritchie Bros Auctioneers have found the best of three worlds with their network. This midsize company enables fast, secure bidding for customers, provides hassle-free mobile access for employees, and detailed network reports with no effort for IT.

Ritchie Bros. Auctioneers is the world’s largest auctioneer of heavy equipment and trucks. They sell billions of dollars of unused and used equipment at hundreds of unreserved public auctions each year. What’s even more impressive is that they are able to do this with only 1300 employees worldwide.

Auctions are very time sensitive and require a synchronized effort. This leaves little room for errors and interruptions.  Read More »

Tags: , , , , , , , , , , , , , , , , , , , , ,

Five Reasons to Upgrade Cisco’s CMX to MSE 8.0 Today

The highly anticipated Wireless Release 8.0 came out last week, and among the feature updates is a key set of enhancements and new modules for Cisco’s CMX solution that come with MSE 8.0.  These updates were designed to build out the breadth of location services available to organizations, as well as improve the user experience for customers working with the CMX solution. These enhancements make five great reasons to upgrade to 8.0 today and test out these new tools and features in your Wi-Fi location deployment:

1. Presence Analytics

This new feature enables the use of a single access point (AP) to determine device presence and dwell time. It provides a simplified way to leverage Wi-Fi technology to Detect, Connect, and Engage your customers. Retail stores, hotels, conference facilities, shopping malls, schools, and even city centers can greatly benefit from Presence Analytics. Unleashing this tool can help customers understand the basic, yet powerful, knowledge of the number of visitors to their space, time spent by the visitors, and frequency of visits. It can even provide a more in-depth look into the movement patterns of their visitors, while within their space, giving an understanding of which areas are most attractive to their client base.

Presence Analytics is very simple to configure by naming the entry, selecting the access point, and setting threshold values. Best of all, the majority of CMX Analytics reports are available automatically. All this allows customers to start using CMX Analytics without having to make any changes to their existing network and get immediate value from it.

mse8_1

2. Enhancements to Guest Access
Those familiar with CMX Connect will know that there are two guest access solutions available to customers with Cisco CMX. The first, CMX Connect, provides organizations with a simple, secure way to provide guest Wi-Fi access. CMX Connect offers the option of custom splash pages using a zone-based captive portal.

In MSE 8.0, we have dramatically simplified how CMX Connect is configured. The administrator only needs to indicate information they’d like collected (such as, name and email), and the zones in which the template will be used. Read More »

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

Security Compliance is Necessary for Real-Time Mobile Data Access

As a business or technical leader, you know you need to protect your company in a rapidly evolving mobile ecosystem. However, threats are not always obvious. As malware and attacks become more sophisticated over time, business decision makers must work with technical decision makers to navigate security threats in a mobile world.

This blog series, authored by Kathy Trahan, explores the topic of enterprise mobility security from a situational level and provides insight into what leaders can do now to mitigate risk. To read the first post focused on securing device freedom, click here. The second post, available here, focused on the risks that come with mobile connections. Kathy’s third post explored how to secure mobile data. – Bret Hartman, Chief Technology Officer (CTO) for Cisco’s Security Technology Group

In today’s mobile and cloud-centric landscape, the ability for employees to access data, account information, real-time statistics, and other pertinent information on their personal devices is what it takes to remain competitive in the business marketplace.

And while the rush has been on to empower employees to be able to connect from anywhere, security concerns are topping the “must address” list of enterprises everywhere.

One key concern is the increasing use of mobile devices to access relevant business information. In fact, according to the Cisco Connected World International Mobile Security survey, 63% of users downloaded sensitive data on such devices.

So, in a scenario where a team of sales representatives are updating account profiles by accessing data on their personal devices, IT and business leaders must ask: How secure is the network the team is using to access sensitive company information? Is it possible malware on their mobile devices can gain entry from a public or private cloud to compromise or steal data? Should mobile security policies prohibit certain employees from downloading certain information when they are off-site?

These questions must be answered. Especially since over the next four years, there will be nearly 21 billion networked devices and connections globally. Business Decision Makers (BDMs) and Technical Decision Makers (TDMs), must team up and determine the best mobile security policies that balance productivity and security of sensitive data, notably understanding security threats and establishing access requirements.
Read More »

Tags: , , , , , , , , ,