Forget the best of both worlds. Ritchie Bros Auctioneers have found the best of three worlds with their network. This midsize company enables fast, secure bidding for customers, provides hassle-free mobile access for employees, and detailed network reports with no effort for IT.
Ritchie Bros. Auctioneers is the world’s largest auctioneer of heavy equipment and trucks. They sell billions of dollars of unused and used equipment at hundreds of unreserved public auctions each year. What’s even more impressive is that they are able to do this with only 1300 employees worldwide.
Auctions are very time sensitive and require a synchronized effort. This leaves little room for errors and interruptions. Read More »
Tags: byod, Cisco ISR G2, Cisco Unified Access, Connected Constuction, construction, EN, IWAN, midmarket, midsize, mobile, Mobile Auctions, Mobile Bidding, mobility, network, Online bidding, Public Auctions, security, small business, smb, UA, wifi, wireless
As the breadth and depth of the ACI solution continues to grow, so does customer interest. Many customers who have invested in, and continue to invest in, the Nexus 2000-7000 switches find the ACI vision very compelling. So, this leads to a logical question regarding how an existing Nexus 2000-7000 fabric will integrate with an ACI fabric.
In short, customers can leverage current Nexus products and add ACI capabilities to their data centers in an incremental manner. Integrating ACI into an existing Nexus environment will not require replacement of existing Nexus switches. The benefits of ACI policy can be extended to apps on both physical and virtual servers within the existing Nexus fabric. This can be achieved as follows (double click on the graphic below to launch the 3+ minute presentation):
In this scenario, the existing Nexus fabric is serving as an optimized transport for an ACI overlay solution. However, this solution is very different from other industry overlay solutions. It’s different in that the ACI overlay provides integrated/embedded support for both physical and virtual servers, it allows use of existing L4-7 infrastructure, while providing the automation functionality of the ACI policy model.
If you’d like to learn more, there is a summary, as well as a white paper available. There is also this video whiteboard session that covers a subset of the elements mentioned above.
Tags: ACI, cloud, data center, network, networking, nexus, technology
A Great Leap Forward
Evolutionary biologists talk about features that suddenly seem to burst forth and enable stunning new capabilities for life forms in the natural world. Eyes. Legs. Flight. And right now service providers have at their fingertips many new operational features that can help them become more agile purveyors of better, faster, and cheaper services. It’s no exaggeration to look at Software-defined Networking (SDN), Network Functions Virtualization (NFV), and other new, evolving technology approaches as part of a groundbreaking, evolutionary leap forward.
Service providers are not alone in embracing solutions that provide greater service agility. A 2013 Gartner study that asked enterprises to list their primary driver for cloud services found that 66% of enterprises ranked agility and service velocity above cost savings and other factors.
Understanding How and When to be Agile Read More »
Tags: agility, network, network fucntions virtualization, NFV, SDN, Service Provider, software defined network
As a business or technical leader, you know you need to protect your company in a rapidly evolving mobile ecosystem. However, threats are not always obvious. As malware and attacks become more sophisticated over time, business decision makers must work with technical decision makers to navigate security threats in a mobile world.
This blog series, authored by Kathy Trahan, explores the topic of enterprise mobility security from a situational level and provides insight into what leaders can do now to mitigate risk. To read the first post focused on securing device freedom, click here. The second post, available here, focused on the risks that come with mobile connections. Kathy’s third post explored how to secure mobile data. – Bret Hartman, Chief Technology Officer (CTO) for Cisco’s Security Technology Group
In today’s mobile and cloud-centric landscape, the ability for employees to access data, account information, real-time statistics, and other pertinent information on their personal devices is what it takes to remain competitive in the business marketplace.
And while the rush has been on to empower employees to be able to connect from anywhere, security concerns are topping the “must address” list of enterprises everywhere.
One key concern is the increasing use of mobile devices to access relevant business information. In fact, according to the Cisco Connected World International Mobile Security survey, 63% of users downloaded sensitive data on such devices.
So, in a scenario where a team of sales representatives are updating account profiles by accessing data on their personal devices, IT and business leaders must ask: How secure is the network the team is using to access sensitive company information? Is it possible malware on their mobile devices can gain entry from a public or private cloud to compromise or steal data? Should mobile security policies prohibit certain employees from downloading certain information when they are off-site?
These questions must be answered. Especially since over the next four years, there will be nearly 21 billion networked devices and connections globally. Business Decision Makers (BDMs) and Technical Decision Makers (TDMs), must team up and determine the best mobile security policies that balance productivity and security of sensitive data, notably understanding security threats and establishing access requirements.
Read More »
Tags: Cisco, Cisco Mobility, future of mobility, mobile, mobile device, mobile security, mobile workspace, mobility, network, security
If you are a professional photographer or even an amateur like me, you want to have ready access to various control dials on your camera to capture the moment perfectly. Professional cameras provide high level of control to get the best outcome. But there are times when you want to put the camera and the lens in Auto mode or wish that the camera could automate some decisions that make your workflow easier.
Likewise, Cisco Wireless LAN products provides the level of quality, functionality and control that is unmatched and hands-down the best enterprise wireless networking portfolio in the industry. But there are scenarios where it is preferable to expedite wireless configuration with best practices automatically enabled and easy access to data to simplify monitoring and troubleshooting workflow. For example, a small business owner manages his own network or in a K-12 a librarian acting like a part-time IT administrator. This not only provides operational efficiencies for the IT organization but also improves end-user and partner experience.
Cisco WLAN Express Setup is an attempt in this direction. It is now available on 2500 Series Controller (CT2504) starting with software release 220.127.116.11.
It includes three components
- Easy-to-use setup wizard: This eliminates the need for console cable and command line setup. Instead, 3-step web-wizard is used to quickly boot strap a Controller and configure employee and Guest WLAN out of the box.
Read More »
Tags: 11ac, 802.11ac, access point, aireOS, analytics, App, application, AVC, best-in-class, Bonjour, cellular, chromecast, Cisco, cmx, configuration, connection, control, controller, data, device, Express, LAN, mag on ap, mobile, mobility, network, networking, optimized roaming, policies, protocol, release, rx-sop, setup, software, Speed, technology, traffic, users, visibility, VLAN, vni, wi-fi, wifi, wired, wireless, wlan, WLC