Cisco Blogs


Cisco Blog > Mobility

Cisco Leads the Gartner Wired and Wireless LAN Infrastructure Magic Quadrant Again!

Gartner has released their 2013 Wired and Wireless LAN Infrastructure Magic Quadrant.  For the 2nd time in a row, Cisco is recognized as a leader in this highly anticipated publication.

Here is the 2013 Gartner Magic Quadrant for the Wired and Wireless LAN Access Infrastructure (Authors: Tim Zimmerman and Mark Fabbi; Published 3rd September 2013).

This graphic was published by Gartner, Inc. as part of a larger research document and should be evaluated in the context of the entire document. The Gartner document is available upon request from Cisco. Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings. Gartner research publications consist of the opinions of Gartner’s research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.

This graphic was published by Gartner, Inc. as part of a larger research document and should be evaluated in the context of the entire document. The Gartner document is available upon request from Cisco.
Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings. Gartner research publications consist of the opinions of Gartner’s research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.

There are two primary criteria for the Gartner MQ — (a) the Completeness of Vision (b) Ability to Execute.

From a vision perspective, Cisco unveiled its vision of Unified Access – One Policy, One Management, One Network — more than a year back (last June, to be precise). This vision was the first step in helping our customers drive business innovations and achieving IT simplicity while addressing the rapid growth of BYOD and Mobility in their organizations.

We were also ahead of the times by having a vision for the network to be a strategic asset (and not a cost center) for our customers. And the way to make this happen was to leverage the network intelligence to drive new customer experiences and revenue opportunities. That’s where our vision of Connected Mobile Experiences (CMX) came about. The idea behind CMX was to enable organizations to improve customer loyalty and increase revenue by delivering context-aware mobile information that matches their customers’ real-time needs and preferences. A retail store, for example, can use the CMX solution to enhance mobile shopping experience, increase loyalty app usage, create targeted personalized marketing and context-rich notifications, and use on-premise visibility to understand and adapt to customer behavior. Its no surprise that the majority of our customers have jointly embraced this Cisco vision and a lot of our competitors are now trying to follow suit.

But the proof is in the pudding.. Read the full blog to find out how Cisco has executed on this vision.

Tags: , , , , , , , , , ,

The Sixth Step to Enterprise Mobility: Power to Your People

This is the sixth post in a blog series featuring Vine-format videos focusing on the “Six Essential Steps for Unleashing the Power of Enterprise Mobility”. The first blog post discussing how to build a mobile structure can be found here. The second blog post highlighting the benefits going virtual can be found here. The third blog post focused on preparing enterprises for the division of devices can be found here. The fourth blog post focused on creating an app checkpoint can be found here. The fifth blog post focused on defending data can be found here.

step6a

Watch video at http://youtu.be/3kD5EpXypFc

Over the course of this series, we’ve discussed how enterprises can better enable people to work in their own way, regardless of where they are and what device they are using. We started by making smart plans at an architecture level and then implementing secure policies along the way. The final step enterprises need to take may be the hardest one of all but can yield the greatest results. To increase productivity, business agility, and customer satisfaction, enterprises must actively embrace mobility in the workplace. Here’s a short checklist to help organizations with this last step:

1. Go Beyond Provisioning Mobility for Sales: Think “All-Company” Mobility.

The definition of mobility is expanding to include not just “road warriors” but also “corridor warriors,” as well as guest and home workers.

Make sure your mobility architecture is designed to accommodate them all. Then create a phased implementation plan. Determine which users and business processes you want to prioritize first and move forward at a pace that makes sense for your enterprise.

An all-hands-on-deck approach will also help drive future implementation of mobile solutions. Read More »

Tags: , , , , , , , , , , ,

Get Your Network Ready For iOS7

September 13, 2013 at 5:30 pm PST

In their highly anticipated announcement this week, Apple introduced two new phones, the iPhone 5C and iPhone 5S, and confirmed that iOS 7 would be released on September 18th. Techies like myself took note that iOS 7 will include quite a number of new features. We at Cisco want to help you understand what iOS 7 means for your network, so here’s a quick blog to sum it up:

How does iOS 7 impact your wireless networks?

Soon your employees and guests will be upgrading to IOS 7. Did you know up to 20% of traffic to mobile devices is software upgrades, application updates and synchronizing your devices via the cloud? Cisco’s Application Visibility and Control technology can help you identify and tame these applications and is available on the routers, Wireless LAN and visible via Prime Infrastructure. In addition, Cisco’s ISR can cache these updates to reserve valuable and expensive WAN bandwidth. More details about protecting the WAN is available in another blog.

If you leverage a Captive Portal, you will experience a change in behavior. Apple has enhanced the Captive Network Assistant (CNA) functionality iOS 7 making it more robust. Cisco has proactively developed and tested a new version of wireless LAN controller code to interoperate with Apple’s new implementation while ensuring a seamless experience for all other clients.

Finally iOS 7 also has significant security and manageability enhancements to improve productivity for the enterprise.

What do you need to do in order to optimize for iOS 7? Read More »

Tags: , , , , , , , , , , , ,

Ask The Futurist: “How Will the Internet of Everything Impact Teachers’ Roles in the Connected Classroom?”

Chalkboards. Textbooks.  Stacks of papers and folders. All of these items can make anyone a little nostalgic and remind us of our time in primary and secondary school. While basic fundamentals remain the same, classrooms are evolving. The reason? The Internet.

This year’s back-to-school season has sparked many conversations around the future of the classroom. Most parents have seen the workforce and everyday life evolve as the Internet of Everything (IoE) begins to connect more people, places, data, and things. Yet questions about IoE in the classroom persist. That’s why in today’s “Ask the Futurist” post, I take a deeper look at how the IoE will impact the classroom of the future.

Today’s question comes from Rob Coote, a systems analyst for a public K-12 school district in Northern Alberta, Canada. Here’s his two-part question:

Question: “How do you envision the future of the ‘connected classroom’ and one-to-one learning in K-12 education? How do you see this impacting or changing the teacher’s role?”

Read More »

Tags: , , , , , , , , , ,

The Fifth Step to Enterprise Mobility: Defending Your Data

This is the fifth post in a blog series featuring Vine-format videos focusing on the “Six Essential Steps for Unleashing the Power of Enterprise Mobility”. The first blog post discussing how to build a mobile structure can be found here. The second blog post highlighting the benefits going virtual can be found here. The third blog post focused on preparing enterprises for the division of devices can be found here. The fourth blog post focused on creating an app checkpoint can be found here

In a 2012 survey of IT executives and CEOs, nearly half of the companies that permit mobility and BYOD reported experiencing a data or security breach as a result of an employee-owned device accessing the corporate network. In addition, security concerns continue to remain a key issue for decision makers looking to deploy additional mobile solutions such as enterprise mobile apps, according to a recent article from IT Pro.

Careful planning can help enterprises manage security concerns and harness the power of mobility. Here’s a brief checklist to help organizations secure devices, data and the network:

Watch the video: http://youtu.be/k8ytncvjE7M

Watch the video: http://youtu.be/k8ytncvjE7M

1. IT Pushing of Capability Down to End Devices

 IT needs to be able to push capabilities down to end devices and access control for both on-premises and off-premises apps, while providing pull capabilities for users, so they can self-provision apps.

IT must have the ability to apply situational control policies (for example, for disabling cameras on mobile devices in order to protect on-premises company assets when employees and guests are on corporate premises or in restricted areas). Another must have? The ability to remotely locate, lock, and wipe devices should there be a theft or if an employee leaves the company. It is also essential to be able to automate geo-specific policies to control roaming costs when workers are out of country. Read More »

Tags: , , , , , , , , , , ,