Cisco Blogs


Cisco Blog > Partner

Cisco Partner Weekly Rewind – January 23, 2015

Partner-Weekly-Rewind-v2Each week, we’ll highlight the most important Cisco Partner Ecosystem news and stories, as well as point you to important, Cisco-related partner content you may have missed along the way. Here’s what you might have missed this week:

Off the Top

Great blog this week from Raja Sundaram. He posted Delivering Business Solutions with Connected Analytics and it’s a good look at how Cisco is using its strength in hardware, software, services and partnering to provide powerful analytic solutions.

If you’re interested in how Cisco can partner with you to ensure your data analytics strategy is in place, be sure to check out Raja’s blog as it can provide insight on how:

  • Partners will be able to tap into a high revenue stream as IT services spend, driven by big data, reaches $44B
  • Big data services opportunities supersede hardware and software opportunities, allowing partners to put a premium on these services
  • Partners will be able to wrap business intelligence, analytics, and data management solutions with their capabilities to deliver value-added services that differentiate their practice

Take a look and let us know what else we can relay to you around data analytics. Read More »

Tags: , , , , , , ,

Summary: Top 10 ICT Trends in 2015: are you ready for digital transformation?

By Kevin Bloch, Cisco Chief Technology Officer, Australia and New Zealand

One of the best parts about my job is that I get to spend a lot of time listening to some very smart people, both internally within Cisco and externally. As we touch so many parts of the global technology industry and market, it puts me in a fantastic position to see what’s coming down the track. So, each year around this time, I take the opportunity to offer some predictions for the year ahead (which, incidentally, is Cisco’s 30th birthday).

It will probably come as no surprise that the biggest theme you’ll hear about this year is digital transformation, which is essentially underpinned by the Internet of Everything (IoE). In the next twelve months, enterprises will spend more than $40 billion globally, designing, implementing and operating the Internet of Things (IoT). Already thirty-eight percent of technology spend is outside of IT.

Read the full Top 10 ICT Trends in 2015 blog and feel free to provide any feedback.

Tags: , , , , , , , , , ,

Why Isn’t It Easier to Customize Enterprise Mobility and Guest Portals?

Enterprises use Cisco ISE for securely granting access to visitors and on-boarding employee-owned devices over Wi-Fi. Portals for users to gain access are becoming more advanced, and the next step is for most customers to create a richer customized experience to:

Promote your brand to guests

AP_blog_1

Read More »

Tags: , , ,

Security or Hybrid WAN’s? Do you need to choose?

Security is hot topic on everyone’s mind and for IT it is a constant challenge to stay ahead of the latest threats and vulnerabilities that their organizations face on a daily basis. Take a quick look at the news and it won’t take you long to find an article talking about the latest cyber attack that resulted in the leak of personal data. So what can organizations and more specifically IT teams do to protect themselves from threats and vulnerabilities. Personally I don’t think you can protect yourselves from all threats and vulnerabilities. Cyber threats will continue to exist and cyber criminals will continue to develop increasingly sophisticated attacks to evade even the most robust security barriers. Even if you were to isolate your network from the internet an intruder could overcome your physical security and launch an attack from within your organization.

So what can you do to protect yourself? I view security as a way to reduce your exposure to threats and you should at a minimum make sure you have the appropriate security measures in place to reduce your exposure to threats and vulnerabilities. While you may never be able to stay one step ahead of cyber attacks you should be in a position to detects threats and be able to mitigate them as fast as possible to reduce your exposure.

Read More »

Tags: , , , , , , , , , , , ,

Geopolitical Trends in Cybersecurity for 2015

New year predictions generally take one of several forms: broad generalizations about multi-year trends, guesses about what might happen, or overviews of recent events disguised as predictions. The first is too easy, the second—going out on a limb—risks missing the mark so badly as to be useless. So I will go with the third choice in the hope that, by calling out some of the common threads running through major stories of 2014, we can take some cues for the future.

Read More »

Tags: , , ,