In the past few years a number of paradigm shifts have made policy-based networking essential to effective enterprise IT management. Some of these shifts include an increased reliance on virtualization and the cloud; the “consumerization” of business networks that has occurred with the popularity of devices such as tablets and smartphones; and the rapid adoption of video in business communications. By applying appropriate policies within the network, IT managers can do a better job of meeting users’ expectations and become business enablers.
We believe our message of One Policy, One Management and One Network has been recognized in the recent Gartner 2012 Wired and Wireless LAN Infrastructure Magic Quadrant, where Cisco has been positioned as a leader.
Foundational to Cisco’s One Policy strategy is the Cisco Identity Services Engine (ISE), which enables organizations to create and deploy unified policy to address the need for BYOD compliance. ISE enables one consistent policy across the entire enterprise, as well as enforcement by correlating a unique combination of contextual information including user, device, location and time.
Read More »
Tags: bring your own device, byod, Gartner, gartner MQ, one policy, policy, security, unified access, wired and wireless
Gartner has released their 2012 Wired and Wireless LAN Infrastructure Magic Quadrant. Cisco is recognized as a leader in this highly anticipated publication.
Our industry is going through dramatic changes. The rapid growth of cloud, mobility and business collaborations has put more and more pressure on the network. Disparate wired and wireless networks architected and managed separately are no longer sufficient to meet the new demand. This is the first time that Gartner covers wired and wireless LAN infrastructure together in one Magic Quadrant. It is a clear sign that the time has come to evolve the network infrastructure to address the rapid growth of cloud, mobility and business collaborations with a unified approach.
Read More »
Tags: Gartner, infrastructure, LAN, Magic Quadrant, management, mobility, Netowrking, policy, security, switching, unified access, wired, wireless
As anyone who attended Cisco’s recent “BYOD without Compromise” Webinar noticed, the BYOD phenomenon is changing company priorities, and is bringing up a lot of questions about the solutions available to scale, secure and operate a successful network. Replay the Webinar
Join us for our upcoming #ciscowifi TweetChat during which you’ll be able to engage in a real time BYOD discussion on Twitter with Cisco Technical Experts. What is a TweetChat?
April 17, 10-11am PST: TweetChat Topic: BYOD and Cisco ISE – use #ciscowifi.
First, I’ve put together just a few details based on the most popular questions posed during the recent webinar about Cisco’s approach to BYOD. And at the end of this post, I’ve also listed upcoming events for even more in depth technical discussions on a variety of BYOD topics.
Enhanced Identity Services Engine (ISE):
Cisco ISE is a context-aware, identity-based platform that gathers real-time information from the network, users, and devices. This enables IT to offer mobile business freedom with policy for when, where and how users may access the network..
ISE integrates with Prime Network Control System and supports BYOD with any 11n Wireless Access Point (even if you’re running your network in FlexConnect – aka HREAP- mode)
In addition to managing on-boarding, Cisco ISE has full guest lifecycle management. It also allows IT to deny access to devices for a variety of reasons; such as who you are, what device it is, if you are running the latest OS or anti-malware or how you are accessing the network..
Posture – Posture is the component of ISE platform responsible for enforcement of corporate security policies governing access to its enterprise network. For example, for non-corp owned devices, you can decide what is the minimal requirements based on the device type/OS etc. Setting this up ahead of time will avoid security issues with non-supported devices
ISE also provides real-time endpoint scans based on policy to gain more relevant insight. These automated features result in a better user experience and more secure devices. Cisco ISE uniquely leverages the network. It is essentially the brains for secure access and provides the policy to the network infrastructure (it is woven into the switches, routers, etc.)
New Prime Infrastructure:
Prime is a single package that provides complete infrastructure – wired and wireless, and mobility lifecycle management– configuration, monitoring, troubleshooting, remediation, and reporting. This solution includes: Prime Network Control System (NCS) for converged wired/wireless monitoring and troubleshooting, plus wireless lifecycle management, with new branch network management functionality; and Prime LAN Management Solution, for wired lifecycle management and Borderless Network services management.
Mobile Device Management (MDM):
To protect data on mobile devices and ensure compliance, Cisco is integrating with multiple Mobile Device Management vendors. This gives IT greater visibility into the endpoint as well control over endpoint access based on the compliance of these devices to company policy (such as requiring pin lock or disallowing jailbroken devices), and the ability to do remote data wipes on lost or stolen mobile devices. If you don’t have a supported vendor, we will not be able to get as rich detail about the status of that device, however, you still get the full wired/wireless policy.
Current MDM third party vendors: Zenprise, Good, Airwatch, MobileIron
Device Operating Systems:
Wondering about which OS is preferred on your mobile device?
Cisco offers broad mobile device OS support in Cisco AnyConnect VPN software, including IOS, Android, and Windows Mobile.
When it comes to virtualization, Cisco has created the Cisco Virtualization Experience Infrastructure (VXI), an end-to-end systems approach that delivers the next generation virtual workspace by unifying virtual desktops, voice, and video. Check out the link for more information on VXI, VXI with Citrix, VXI with VMware, Virtualization Services and validated Design Guides http://www.cisco.com/web/solutions/trends/virtualization/index.html
This is just a drop in the bucket. To get even more information on taking your organization beyond BYOD, don’t miss our upcoming technical deep dive webinars and in person events that speak directly to managing your growing network while you’re doing your best with limited resources. You can also check out Cisco’s BYOD solution, Prime and ISE:
Tags: byod, cisco prime, ISE, mobility, policy, security, wifi
Over the last few months, a growing consensus has emerged pointing to a dramatic change in the way people access the Internet.
In 2011, for the first time ever, worldwide annual demand for smart phones surpassed that of PCs, laptops and tablets combined. Then last month our Mobile Visual Networking Index (VNI) Update reported that global mobile data traffic is growing even faster than previously forecasted and will increase 18-fold over the next five years.
So by this year’s Mobile World Congress in Barcelona in February, the ‘top of mind’ for network operators, government officials and device manufacturers was the dramatic accelerating impact that mobile data consumption will have on Internet access, networks and users.
When we launched the mobile VNI report on February 14, a panel of industry, academia and government experts glimpsed into the future of mobile broadband and related policy issues, with three key takeaways:
Read More »
Tags: barcelona, cloud, fiber, global cloud index, heterogenous networks, mobile, mobile world congress, off-loading, policy, regulations, small cells, vni, wireless, wireline
By Howard Baldwin, Contributing Columnist
Wireless bandwidth has been on my mind a lot recently. Computerworld recently published my article, Wireless Bandwidth: Are We Running Out of Room?, which led to a stint on NPR’s “To The Point” on the topic. But until I tuned into one of the latest Broadband Breakfast presentations, The Wired Home and Wireless Policy – Convergence Legislation and Consumer Adoption, I didn’t realize that I’d been thinking about wireless in a way that technology people are supposed to avoid: in a silo.
Read More »
Tags: broadband, fiber, policy, Service Provider, wireless network, wireline network