Cisco Blogs


Cisco Blog > Mobility

Announcing Cisco Unified Access Webinar Series

The ever-increasing number of devices and applications coming into the workplace poses complex challenges for the enterprise. As a result, IT must adapt the ways in which they enable, manage, and secure end-user access.

  • How will the network handle increased demand for bring-your-own-device (BYOD) policies and mobility?
  • How can IT maintain raised expectations for wired devices, while improving the end-user experience?

To solidify IT as a key contributor in driving better business processes, IT teams must shift from maintaining the network to delivering innovative, connected experiences. The key to success is to simplify the network, and Cisco Unified Access does just that.

Mark your calendars for our five-part webinar series to learn how to create an effective, unified access strategy. Find out how to transform IT to better address the demands of BYOD and next-generation technology.

  • Wednesday, April 3: Activate the IT Transformation <--Register NOW!
  • Wednesday April 17: One Network Part 1: Deploying Unified Access
  • Wednesday May 1: One Network Part 2: Simplifying the Network Infrastructure
  • Wednesday May 15: One Policy: Centralized Policy, Control and Enforcement
  • Wednesday June 5: One Management: Converged User Access Management

You will learn how to: Read More »

Tags: , , , , , , , , , , , , , , , ,

The Secret to Mobility in a Multiple Device World

The Internet of Everything is all around us. People are connecting on the go in new ways, and they expect fast, secure network connections that follow them anywhere and everywhere —at work, at home, at play, at the mall, at the gym, or even at the ballpark.

Not so long ago, getting on the Internet was a static experience. It was a desktop PC tethered to the company network, or for the elite the “double, double, toil and trouble” of a modem firing up, followed by a long wait for a sluggish home connection.

The new era of mobility takes computing beyond the PC’s limitations, surpassing it by a long shot. It’s becoming less about devices than what you can do as the workspace evolves, offering adaptability and choice based upon who you are, where you are, and what you need to accomplish. Whether it’s a quick phone call, a web conferencing session, instant messaging, or file sharing, removing the limitations of location and devices lets organizations work together better and make decisions faster.

What is driving these changes? When people think of mobility, they usually focus on the devices used to access the net. Slick new smart phone displays, multi-touch tablet screens, and futuristic industrial designs are definitely eye-catching. Consumers are snapping up these new devices, and companies are embracing bring-your-own-device (BYOD) programs. But what’s happening behind the scenes and on the screens is just as important—if not more important.

Read More »

Tags: , , , , , , , , , , , ,

Enterprise Networks and the Drive for IPv6

It was not that long ago that whenever I read an article about IPv6, it usually discussed how the IPv4 Address depletion in other countries. At that time, the adoption of IPv6 was coming from other countries that where the v4 address space was depleted, the US Government, or Service Provider. Well fast forward only a few years and you can include Enterprise Networks in that mix.

Driving this IPv6 train for enterprise networks is wireless technology and the enabling by-product, BYOD. Wireless technology, in particular, Wi-Fi has grown from a toy to a requirement in most businesses today. We have moved from 802.11b which gave you a max datarate of a paltry 11Mbps to 802.11n to a max datarate of 450Mbps if you currently deploy the Aironet 3600 Access Point that supports 4x4 MIMO; if not, it’s a max datarate of 300Mbps. Never mind the fact that we will soon see the Wave 1 version of 802.11ac will have a datarate of 1.3Gbps and Oh BTW, Wave 2 promises a scorching datarate of 6.9Gbps!

ipv6 bill

Read More »

Tags: , , , , , , , , , , , , , , ,

Three Transitions Driving Net-Centric Security

When I think about IT security, I don’t immediately start thinking about threats, hackers and countermeasures, but begin with what is happening to IT in general. Right now, the three big megatrends in IT can be summed up in three words: virtualization, collaboration, and mobility. Unfortunately, it’s become something of a Newtonian principle that any action driving information technology forward generates an equal or greater counteraction by hackers to corrupt and exploit the new technology. I also find it disconcerting that at any given time, the most aggressively marketed “solutions” to IT security problems represent a trailing indicator of what cyber criminals are actually doing to raise hell. Read More »

Tags: , , , , , , , ,

Client Adoption for 802.11ac Wireless Technology

When it comes to the adoption of new technology such as 802.11ac, the industry becomes a farmer’s almanac of predictions when it comes to when and what devices and products will announce 802.11ac support.  Aside from Cisco, who boldly announced support for 802.11ac on the 3600 Access Point for the enterprise, there have been a number of consumer devices such as home routers, bridges, a selection of USB clients and a single gaming oriented laptop that are offering support for the new 802.11ac specification.

With HTC’s announcement of 802.11ac support for their HTC One smartphone, we would expect others to follow suit in the near future, setting the stage for the first series of devices to bring integrated 802.11ac to market sometime in CY13. As these device become available you can expect them to be connecting to your corporate networks as BYOD devices for corporate use. With the devices come the expectations where your end-users are going to be looking for that extra bump in network performance promised by the 802.11ac standard.

Next up, Tablet and notebook devices.

Read More »

Tags: , , , , , , , , , , , , , , , , , , , ,