Cisco Blogs


Cisco Blog > Partner

The ‘Eight Success Drivers’ You Need to Know to Strategically Plan Your Workforce

December 6, 2012 at 8:43 am PST

 

 

 

 

This is the first in a new Cisco Partner Talent blog series authored by Kaycee Tan, who is the marketing manager for Cisco Partner Talent. By working together, the aim of Cisco Partner Talent is to help partners attract, develop, and retain the right people with the right skills at the right time. .

Do you have talent gaps in your practice? Do you know what investments you need to make to fill them? How about some actionable steps to succeed?

Strategic Workforce Planning (SWP) addresses these challenges, helping to ensure our partners are able to link their talent strategy with their business strategy—and have the talent they need to achieve their business goals.

We encourage you to learn about the SWP “Eight Success Driver” lessons, and see how 3M, The Principal Financial Group, and Regence have successfully implemented  a more rigorous and business-based workforce planning process in support of better talent investment.

These lessons include: Read More »

Tags: , , , , , ,

The 5940 ESR has been awarded FIPS validation #1639 and is complete!

November 21, 2011 at 10:51 am PST

The 5940 ESR has been awarded FIPS validation #1639

The Cisco 5900 Series Embedded Services Routers (ESR) are optimized for mobile and embedded networks that require IP routing and services. They can operate reliably in harsh environments, such as those subject to power surges and extreme weather conditions.

These routers are complemented by Cisco IOS Software and Cisco Mobile Ready Net capabilities. With this technology, they provide highly secure data, voice, and video communications to stationary and mobile network nodes across wired and wireless links.

FIPS-140 is a US and Canadian government standard that specifies security requirements for cryptographic modules. A cryptographic module is defined as “the set of hardware, software, and/or firmware that implements approved security functions (including cryptographic algorithms and key generation) and is contained within the cryptographic boundary.” The cryptographic module is what is being validated.  The NIST website contains details on the Cryptographic Module Validation Program (CMVP).

For further information on Global Government Certifications, please visit here: http://www.cisco.com/web/strategy/government/sec_cert.html

Tags: , , , , , , , , , ,