In many parts of the world there was a holiday period and celebration of the New Year, and it reminds me that the world has holiday periods all year round. What happens to your remote access demands during holidays? One would think that being on holiday means no one needs access to corporate resources, correct? Sometimes I really wish that were true. Sadly, that has not always been the case even for me. As an example or two, maybe you can relate to the people below or know someone like this:
Each week, we’ll highlight the most important Cisco Partner Ecosystem news and stories, as well as point you to important, Cisco-related partner content you may have missed along the way. Here’s what you might have missed this week:
Off the Top
Great blog this week from Raja Sundaram. He posted Delivering Business Solutions with Connected Analytics and it’s a good look at how Cisco is using its strength in hardware, software, services and partnering to provide powerful analytic solutions.
If you’re interested in how Cisco can partner with you to ensure your data analytics strategy is in place, be sure to check out Raja’s blog as it can provide insight on how:
- Partners will be able to tap into a high revenue stream as IT services spend, driven by big data, reaches $44B
- Big data services opportunities supersede hardware and software opportunities, allowing partners to put a premium on these services
- Partners will be able to wrap business intelligence, analytics, and data management solutions with their capabilities to deliver value-added services that differentiate their practice
Take a look and let us know what else we can relay to you around data analytics. Read More »
By Kevin Bloch, Cisco Chief Technology Officer, Australia and New Zealand
One of the best parts about my job is that I get to spend a lot of time listening to some very smart people, both internally within Cisco and externally. As we touch so many parts of the global technology industry and market, it puts me in a fantastic position to see what’s coming down the track. So, each year around this time, I take the opportunity to offer some predictions for the year ahead (which, incidentally, is Cisco’s 30th birthday).
It will probably come as no surprise that the biggest theme you’ll hear about this year is digital transformation, which is essentially underpinned by the Internet of Everything (IoE). In the next twelve months, enterprises will spend more than $40 billion globally, designing, implementing and operating the Internet of Things (IoT). Already thirty-eight percent of technology spend is outside of IT.
Read the full Top 10 ICT Trends in 2015 blog and feel free to provide any feedback.
Enterprises use Cisco ISE for securely granting access to visitors and on-boarding employee-owned devices over Wi-Fi. Portals for users to gain access are becoming more advanced, and the next step is for most customers to create a richer customized experience to:
Promote your brand to guests
Security is hot topic on everyone’s mind and for IT it is a constant challenge to stay ahead of the latest threats and vulnerabilities that their organizations face on a daily basis. Take a quick look at the news and it won’t take you long to find an article talking about the latest cyber attack that resulted in the leak of personal data. So what can organizations and more specifically IT teams do to protect themselves from threats and vulnerabilities. Personally I don’t think you can protect yourselves from all threats and vulnerabilities. Cyber threats will continue to exist and cyber criminals will continue to develop increasingly sophisticated attacks to evade even the most robust security barriers. Even if you were to isolate your network from the internet an intruder could overcome your physical security and launch an attack from within your organization.
So what can you do to protect yourself? I view security as a way to reduce your exposure to threats and you should at a minimum make sure you have the appropriate security measures in place to reduce your exposure to threats and vulnerabilities. While you may never be able to stay one step ahead of cyber attacks you should be in a position to detects threats and be able to mitigate them as fast as possible to reduce your exposure.