Cisco Blogs


Cisco Blog > Collaboration

“Is It Time To Become a Collaboration Technology Broker?”

It’s no coincidence that when choosing where to work, Type A personalities gravitate to organizations at the leading edge of their chosen field or that enable them to make a real difference. But gone are the days when you see “cell phone provided” in a job offer.  I don’t think I’ll choose my next employer based on what collaboration tools they provide, but I will make a point of measuring how seriously they take collaboration and how it fits into their operations. For me it will always be an important selection criterion.

They say “people don’t leave companies, they leave managers.”  I think people leave cultures that hinder them for ones that promise to set them free.

With so many disruptive technologies and deployment options, it can be difficult for IT teams to support broadening and challenging business needs. Increasingly, and often out of frustration around ‘Slow IT’, individual business units are acting as buying centers themselves; creating an issue of ‘shadow IT’.

Read More »

Tags: , , , , , ,

#HigherEdThursdays: Changing How IT is Consumed on (and off) Campus

Universities are driving the need for IT consumption-based pricing models more than any other market segment.  This is natural given the unique characteristics of their IT environments.  First off they are at the forefront of the IT consumerization movement driven by new generations of students and work habits. With one fourth of the undergraduate population and half in most graduate programs changing every year, one can easily understand why this is the case. While BYOD has emerged in the enterprises over the past few years it has been a commonplace in higher education since campus networks were built in the 80s.  When public cloud-based applications emerged college students were the first to embrace them and driving some to a prominent position in the industry.  Facebook comes to mind.

It is not just students that make the universities very different than other markets.  On many campuses you find different layers of IT functions and associated decision making.  You have the central IT like all enterprises do.  But then you have some lines of business having their own IT function either at the college or department levels.  Most major research centers have their own IT groups especially if they house a supercomputing facility.  Some grant-funded projects make their own separate decisions on IT services unique for such projects or for very short terms needs.

So what are the pricing models the higher education market is asking for? The answer is of course consumption-based pricing models but the devil is in the details.  A simple subscription style “all-you-can eat” model may not be sufficient in most cases  (and it is not really consumption-based after all, is it?).  We see these in traditional enterprise applications that are converted to a SaaS offer. A utility style “pay-as-you-go” model while provides most flexibility might not have the cost predictability the universities require (remember long distance phone service?). Read More »

Tags: , , , , ,

Shining a New Light on Shadow IT

More people than ever are talking about “shadow IT” nowadays.  As the name implies, it’s mysterious, perhaps even malevolent by some people’s standards.  From a traditional IT vantage point, this negative view may be somewhat justified given the risks it creates around security, compliance, productivity, and technology investment.

But let’s look at it from another perspective. Shadow IT is on the rise because more people outside of IT are gaining awareness and access to technology, and harnessing it as a business differentiator. More importantly, many of these people are business leaders with growing budgets that align to their priorities. Here’s how much technology budget growth business leaders expect in the next year:

(read more)

Over the next year how will your group’s technology budget change 

Source: Cisco Business and IT Priority Survey results Read More »

Tags: , , , , , , ,

Enabling the Business Value of Cloud Through Intelligent Infrastructure

IWAN ImageThe advent of the many clouds has now become a reality. Enterprises of all sizes and segments are embracing cloud solutions, whether private internal cloud, Virtual Private Cloud, Public Cloud, or some Hybrid. The number of workloads as well as cloud traffic  are expected to grow exponentially in the next 5 years.

The shift to the many clouds has significant impact on the role of IT.  IT has to reinvent itself to be able to keep control as applications are increasingly moving to cloud infrastructures.

In particular, there are two very strong trends that will require IT to increasingly position itself as a Broker of Services, and evolve from a more traditional role of being an infrastructure provider.
First, line of businesses intend to address some of their IT needs directly by purchasing cloud-based IT services. Read More »

Tags: , , , , , ,

Summary : Beyond Data Security…Five Biggest Risks of Shadow Cloud IT Services

In his recent blog (Unleash the Promise of Cloud), Enrico Fuiano reports  how a Cisco Intel study  clearly indicates that Line of Business (LoB) leaders have been playing a more important role in driving requirements for IT solutions and services. Amongst the reasons driving this shift, Enrico pointed to the “shadow IT” initiatives.

BobDimiccoRobert  Dimicco, Cisco Senior Director , Global leader and founder of Cisco’s Cloud Consumption and Broker Services Practice  tells  a similar story , as he recalls  a recent  conversation with a CIO “My CFO and CEO just asked me if I knew how many of our users were accessing cloud services. They asked me if I knew how much we were spending or if there were any risks.” He said, “Bob I don’t know the answers, and I don’t have a plan.”

In his blog, “Beyond Data Security ..Five Biggest Risks of Shadow Cloud IT Services “ Bob shares that “In working with our customers, we have found that there are typically 5-10 times more cloud services being used than are known by IT.”  This challenging trend, called Shadow-IT is not without any risk . In fact , Bob describes  the 5 major risks of Shadow IT which are

  • Data Security Risks
  • Brand Risks
  • Compliance Risks
  • Business Continuity Risks
  • Financial Risks

So how to identify these risks and deal with them ? Bob explores the benefits and  services offered by the Cisco Data Center Assessment for Cloud Consumption.

  • Identify unauthorized cloud services and gain greater visibility into your cloud usage in order to reduce
    security and financial exposure
  • Mitigate risks by proactively identifying risk and compliance issues associated with cloud usage
  • Reduce costs through recommendations to consolidate and/or eliminate cloud services
    ◦ Obtain early warning of overage and related charges
    ◦ Identify duplicate services and identify potential candidate cloud services for consolidation
    ◦ Highlight over- and underutilized services
    ◦ Estimate potential cost savings through a customized financial model
  •  Enable greater business agility through cloud governance, which can help IT and LOBs
    efficiently select and deploy cloud services to rapidly meet organizational needs
  • Enable greater business agility through cloud governance, which can help IT and LOBs
    efficiently select and deploy cloud services to rapidly meet organizational needs

To learn more, and start now to build a plan,  check Bob’s blog here 

Tags: , , , , ,