Users are increasingly carrying their iPads, iPhones and Android smartphones into the workplace. These mobile devices and tablets introduce new security threats and IT management challenges.
Join us for the third in our series of webinars to learn about new Cisco innovations that will help you identify the devices, apply policies and enable user management across wired and wireless networks. Featuring special guest speaker Dan Larkin, Director of Strategic Operations for the National Cyber-Forensics and Training Alliance (NCFTA) who will share the new threat vectors introduced due the influx of mobile devices. Take control of your network now.
Live webcast Wednesday, May 4th from 10:00 -- 11am PDT (12:00 -- 1:00pm EDT)
Tags: Android, Cisco, iPad, iphone, management, mobile devices, network, security, smartphone, wi-fi, wifi, wireless
How will the explosion of mobile devices, security threats, video, and cloud effect how customers build their networks?
What are the pitfalls to taking a tactical (or good enough) approach to networking?
And why is good not good enough for enterprise networks?
These were among the questions tackled when Cisco’s Rob Lloyd, EVP of Worldwide Operations, and Mike Rau, VP and CTO, Borderless Networks, hosted a 45-minute webcast to debunk the Myth of the “Good Enough” Network. Along with Bob Cagnazzi, CEO of BlueWater Communications, Rob and Mike discussed:
• IT industry trends driving the evolution of the network
• Common misperceptions about taking a “good enough” approach to networking
• Real world benefits of investing in the network as a strategic asset and innovation engine
What are the seven myths of the Good Enough Network? Tune in to the replay of the webcast to find out!
• White Paper: When Good Enough Isn’t Good Enough
• Video: NetNoGo Video
• Blog: Seven Myths of the Good Enough Network
Tags: Cisco, cloud, data, enough, mobile, myth, network, partner, video, virtualization
We’ve all heard some pretty outrageous myths and urban legends. You know, your mom probably warned you that if you swallow chewing gum, it will remain undigested in your gut for seven years.
Or did you hear that penguins will fall on their backs trying to see airplanes flying overhead?
And, finally, you may have heard that a “good enough” network will work just fine for video, voice, and mission-critical applications.
The truth is, none of these myths is true.
And there was some major mythbusting going on yesterday during the “Debunking the Myth of the Good Enough Network” webcast.
Bob Cagnazzi, CEO of BlueWater Communications Group (Cisco Master Partner); Rob Lloyd, Cisco’s EVP of Worldwide Operations; and Mike Rau, Cisco’s VP and CTO of Borderless Networks helped to debunk the seven most misleading myths of the “good enough” network. They talked about the dreaded Single Purpose Myth, the horrific Security as a Bolt On Myth, and the scary Application and Endpoint Ignorant Myth, just to name a few.
After he debunked those myths, Mike then provided key questions for our partners to ask their customers to find out if their network is ready.
Ready for what? Read More »
Tags: bluewater, cagnazzi, CEO, customer, debunk, mike rau, myths, network, partner, rob lloyd, video, virtualization
With 7.1 billion tablets, smartphones and other mobiles devices entering the market—and many making their way into the enterprise—how can you effectively manage user access over the wired and wireless network? Help your users and their devices get online, stay online with comprehensive visibility into you network.
Join our experts for a live Q&A TweetChat on Cisco Prime Network Control System, and see how we enable converged user, access and identify management across wired and wireless networks.
Win (1) Amazon Kindle or one of (2) $5 Starbucks gift card for simply participating live! Winners will be randomly selected for asking a relevant question, sharing a comment or Re-Tweeting a post with the #ciscowifi hashtag. Read the full terms and conditions.
Tuesday, May 3rd at 9-10am PDT (12-1:00pm EDT)
On the day of the event, follow the conversation with the hastag #ciscowifi on any of the following platforms:
Follow the discussion, contribute questions and submit your own comments by including #ciscowifi with all of your Tweets, regardless of the platform you use.
- Saurabh Bhasin (@sabhasin), Product Line Manager for Cisco Prime NCS
- Scott Simkin (@Cisco_Mobility), Mobility Solutions Marketing
- Brian Robertson, Mobility Solutions Marketing
Questions / Comments?
You can submit your questions ahead of time by sending a Tweet to @Cisco_Mobility or by commenting on this blog.
What is a TweetChat?
TweetChats are online conversations, held at a pre-arranged time, between a group of Twitter users, and using a specific Twitter hashtag (#ciscowifi) to identify the discussion.
We hope to see you on May 3rd, 2011, 9-10:00am PDT (12-1:00 EDT), just follow the hastag #ciscowifi.
Tags: give-away, kindle, network, network management, prize, tweetchat, twitter, wifi, wireless, wlan
There is a debate raging in the IT industry about the role of the network.
In the same week that a gaming company’s network was hacked and the personal information of 60 million customers was leaked, there is a debate raging about whether the network matters.
In the same moment that the iPad is being adopted by 65% of the Fortune 100 — obliterating conventional wisdom about how corporate networks support consumer devices and mobility —there is a debate raging about whether the network matters.
On one side we have newcomers to the networking industry and some industry commentators who believe that the value of a network should be determined only by the cost of its components. They argue that customers should focus squarely on acquisition cost, not the value of their network assets. They argue that customers should focus on capital cost, not network capability and innovation. They believe the network has become a utility; that ‘good’ is good enough.
We all understand that negotiating the best price for goods and services always makes good business sense. But this debate is about more than that.
The debate is about making a choice between a tactical network where getting the lowest possible price up front is paramount – and a strategic network investment that enables customers to adapt quickly to new business imperatives and to handle the increased demands on their business.
This debate has fueled numerous myths and misperceptions in our industry. Here are the seven most misleading Myths of the Good Enough Network.
Read More »
Tags: good enough, myths, network, QoS, security, tco