Cisco Blogs

Cisco Blog > Enterprise Networks

Securing Your Network Before BYOD or IoT

If you’re a network engineer or have been following some of the recent trends in network security space, you may have come across terms such as “erosion of trust”, “zero trust ecosystem”, “the increased attack surface” and “new attack vectors”. What this means for a network engineer is that as application migrate from on-prem to cloud, and trends like mobility and IoT vastly expand the scale of assets and forms of access to be secured, traditional network security, which historically was centered around securing the perimeter of your network, is no longer sufficient.

Anatomy of Data Breach

I was recently reading the Symantec Internet Security Report. This report has been quite appropriately themed as “2013: Year of the Mega-Breach”. In particular, the Point-of-Sale type of attack, mostly prevalent in the retail segment of the market, is a great indicator of the anatomy of a typical breach. So I’ll use that as an illustrative example for the purposes of this post.

Read More »

Tags: , , , , ,

TU Darmstadt Rolls Out Cisco Unified Access to Prepare for 802.11ac

May 27, 2014 at 11:31 am PST

Technische Universität Darmstadt, usually known as TU Darmstadt is a research university based in Germany. It was founded in 1877 and over the last 137 years has grown to be among the largest and most prestigious public universities in Germany serving over 25,000 students per year. It is the alma-mater to many world-wide leaders from Nobel prize winners, a CEO of a fortune 500 company, a president of a country and multiple World Robocup champions.


No wonder, they have a reference from Albert Einstein!


In 2009 TU Darmstadt embraced BYOD with the 5508 Series Controller managing the 1140 802.11n Access Points. Recently we talked to Thomas Vogel, the Head of Network Group and Andreas Liebe, the Network Services Manager who have over 15 years of experience managing WLAN environments. In this blog, we will describe some of the details of WLAN deployments using the 3850 Series Switch and the 5760 Series Wireless LAN Controller to address the new requirements in the school environment. Read More »

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

Announcing: New Catalyst 3850 SFP Fiber Switch Models Expand Cisco Unified Access

May 19, 2014 at 5:30 am PST

Catalyst 3850 FiberOver a year ago, Cisco launched its first flagship Catalyst 3850 series switches at Cisco Live London. With its integrated wireless LAN controller functionality and the innovative UADP ASIC, the Catalyst 3850 switches provide a converged wired and wireless platform that is the heart of “One Network” in the Cisco Unified Access “One Policy. One Management. One Network” approach.

Today, we are excited to announce an addition to the Cisco Catalyst 3850 series switch family: the new Catalyst 3850 1G SFP fiber switch models. They are new SKUs in the Catalyst 3850 switch family and they help further expand the Cisco Unified Access solution. I’ll explain how later, but first let me help you get familiar with this new product offering.

The new Catalyst 3850 SFP fiber switch models have nearly everything identical with their sibling access switches in the Catalyst 3850 switch family: Read More »

Tags: , , , , , ,

School Board of Sarasota County Prepares WLAN for 802.11ac

May 16, 2014 at 9:30 am PST

Sarasota County Schools includes 24 Elementary Schools, 9 Middle Schools, 8 High Schools and various Technical and various Special Centers. It houses about 40,000 students in about 250 buildings. The Sarasota School IT Team believes in using the best-in-class technologies to provide the optimal connected experience for students, faculty, staff and guests.

This next generation pervasive WLAN network enables students to collaborate with each other anywhere on the campus and with the teachers in the classroom. In the previous blog, we described how Bowdoin and the Pinellas County have embraced the IOS based 5760 Series controllers. In this blog, we will cover more details about the recent upgrade of the Wireless LAN Controller from the previous model WiSM to the new model 5760 and describe highlights of our conversation with xx about the WLAN deployment itself.

Read More »

Tags: , , , , , , , , , , , , , , , , , , , , , , ,

Shining a New Light on Shadow IT

More people than ever are talking about “shadow IT” nowadays.  As the name implies, it’s mysterious, perhaps even malevolent by some people’s standards.  From a traditional IT vantage point, this negative view may be somewhat justified given the risks it creates around security, compliance, productivity, and technology investment.

But let’s look at it from another perspective. Shadow IT is on the rise because more people outside of IT are gaining awareness and access to technology, and harnessing it as a business differentiator. More importantly, many of these people are business leaders with growing budgets that align to their priorities. Here’s how much technology budget growth business leaders expect in the next year:

(read more)

Over the next year how will your group’s technology budget change 

Source: Cisco Business and IT Priority Survey results Read More »

Tags: , , , , , , ,