Cisco Blogs


Cisco Blog > Perspectives

Solving the Network Location Problem with LISP

July 24, 2013 at 11:12 am PST

Your Location Has Changed, Carry On!

Solving the Network Location Problem with LISP (Locator/Identifier Separation Protocol)

The first thing that comes to mind when someone mentions location is our GPS location. Our ability to roam around the earth with our mobile devices is something many of us take for granted. However, at the packet level on the Internet of Everything (IOE), trying to map the network location of a trillion new things may require some new thinking.

Wibbly Wobbly - by Andrew Heath

Wibbly Wobbly -- by Andrew Heath

Read More »

Tags: , , , ,

[Cartoon Catalyst Blog Series] K-12 BYOD. Secure Students, Determine Internet Access, and Yet Provide Awesome Network Performance?

Students bounding into schools touting the latest device is creating big problem for K-12 IT departments. How can schools support BYOD initiatives while securing these mobile devices and the student information embedded within them if IT staff numbers aren’t growing?

In his latest blog, K-12 BYOD. Secure Students, Determine Internet Access, and Yet Provide Awesome Network Performance?, Cisco’s Rahul Chohan discusses how Identity Services Engine policy deployment as a part of Cisco BYOD Solutions for K12 Education helps simplify mobile device security streamlines the IT security processes required to deploy BYOD. Rahul’s blog covers how ISE helps protect minors, ensure performance, and simplify IT over the wired and wireless infrastructure. How exactly can it do this? You’ll have to read his blog to find out.

For more on Cisco BYOD Solutions for K12 Education page.

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

Connection, Collaboration, and Innovation at the Cisco Networking Academy Conference

July 18, 2013 at 7:50 am PST
Cisco Executive Chairman Emeritus John Morgridge

John Morgridge

The annual Cisco Networking Academy Conference opened with a fitting tribute to celebrate its rich 15-year history. Cisco Executive Chairman Emeritus John Morgridge took the stage just days before his 80th birthday and told the audience the story of how Networking Academy was founded. Hundreds of academy instructors and Cisco staff watched in person from Cisco headquarters in San Jose, California and virtually from around the world.

According to John, there are 3 reasons why NetAcad has been such a success. First of all, it capitalized on Cisco’s strengths and capabilities. Cisco also invested for the longer term: 15 years and hundreds of millions of U.S. dollars. Finally, he mentioned and thanked the great instructors who have taught more than 4.75 million students in 165 countries since 1997. Today, NetAcad is evolving to keep up with the ever-changing educational system. One key component, according to Morgridge, is that “we test to master not to measure.”

Read More »

Tags: , , , , ,

Three Simple Ways to Boost Mobile Device Security

The explosion in business mobility is transforming our companies in profound—and sometimes challenging—ways. One of the most vexing issues is security.

Recently, I came across a Wharton article predicting that by 2015, more Americans will access the Internet through mobile devices than PCs. From open data to an increase in government-accessed information, this sweeping trend raises questions about the true security of mobile networks and devices. But how can an organization support the infusion of wireless devices into employees’ lives without opening the door to heightened security risks? Read More »

Tags: , , , , , , , , , , , ,

[Cartoon Catalyst Blog Series] K-12 BYOD. Secure Students, Determine Internet Access, and Yet Provide Awesome Network Performance?

So many students, so many devices, yet zero increase in number of IT staffers. The increasingly unbalanced ratio is enough to cause a few nightmares for any IT professional.  Luckily, supporting student IT requirements, while remaining secure, has become a bit simpler with Identity Service Engine (ISE)  Policy Deployment, part of Cisco BYOD Solutions for K12 Education.   With ISE, IT staffers can quickly add and support student’s devices like laptops, smart phones and tablets and at the same time ensure the protection of student information access, dynamically control who gets access to what and provide optimal network user experience.  You can be rest assured that we have your back while you balance it all.

K-12 TightRope1    

Protection of Minors – Let’s face it – K-12 means we’re talking about minors, so we need to tread quite carefully. Extending network access across wired and wireless opens education to a world of innovation; yet it also opens the network up to security threats. 64% of parents feel it is a schools responsibility to effectively teach students how to use their mobile devices safely [Info graphic].  Protection of access to and access by students is a high-priority.  It is critical to restrict access to confidential student records while making sure students get the right access to resources they need for learning. The ISE component of the  K12 BYOD Solution protects student information through secure,   role-based, application access – simply -- over the wired and wireless infrastructure. Read More »

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,