Cisco Blogs


Cisco Blog > Small Business

High-Performing Virtual Private Network Makes Life Easier

In the second installment of our Valley Sleep Center case study, we witness the importance of installing a robust, secure virtual private network (VPN). As a medical clinic, Valley Sleep Center needs to maintain HIPAA compliance and also allow employees to review confidential patient records. Overhauling its antiquated VPN technology, the company implemented a high-performance Cisco VPN solution. Now, employees have reliable connections and can efficiently transfer files among the business’s five locations. Perhaps the best benefit, however, is the peace of mind that comes from the security provided by the right network.

Part One of the Valley Sleep Center

Watch Part Two>>

Read More »

Tags: , , , , , , ,

The Right Network Helps Cut Costs by 50 Percent

Today, we’re debuting a four-part customer case study on sleep disorder clinic Valley Sleep Center. Located in the metropolitan Phoenix area, the business was looking to expand from two to five locations within a year. Struggling with slow VPN connections and an outdated phone system, the company decided to upgrade its network. The result? A 50% reduction in costs. Watch the video below to see how upgrading to the right network benefited Valley Sleep Center’s bottom line.

Watch the video! Read More »

Tags: , , , , , , ,

Supercharge your ISR with Hardware Accelerated VPNs

Next Gen Encryption w/ 3x Performance

Everyone has dirty secrets. One of mine is that I like Mazda Miatas, little sports cars that are cheap to buy, cheap to own, handle well, perform above expectations and require little care. Regardless of how you feel about handling and the sensation of dropping the top and having the wind blow through your hair, a little Miata can only do so much. Try to pass, uphill, on a warm day and god forbid, do so with the air conditioner on and a passenger on board, and that little Miata is going to be taxed out. That is one of the reasons I added a little bit of hardware acceleration in the form of a supercharger to mine. Suddenly, with that small upgrade, the little car that could but suffered under heavy load suddenly became the little car that did.

This reminds of me a new product for the ISR Read More »

Tags: , , ,

Securing the Mobile Experience Made Simpler

It is no longer a question of “if” your organization will face the new reality of mobile device proliferation, just an ever closer “how soon.” Users expect the network to enable trends like Bring Your Own Device (BYOD), and they aren’t just using smartphones and tablets to be more productive, they are falling in love with them. For businesses, simply allowing access isn’t the answer. It’s a question of relevant, secure access across the entire network, while protecting corporate assets and delivering an optimal user experience. Cisco focuses on exactly that -- how to enable a simple and secure mobility experience, with a consistent end-to-end architecture across wired, wireless and VPN access.

As a cornerstone of this wired-wireless access architecture, the Cisco Identity Services Engine (ISE) has already been helping customers like Whittier Union High School, San Antonio Water System and BlueWater Communications Group apply consistent security across the entire network through a centralized, single policy source.

Whittier Union High School District, a California high school district serving more than 13,600 students, was facing the challenge of mobile devices. Both faculty and students were bringing their personal devices on campus, many for educational apps and tools.

“It’s becoming increasingly critical to provide employees, students, and visitors access to our network and extensive educational resources given the growing expectations of our tech-savvy population,” stated Karen Yeh, Director of Information Technology, Whittier Union High School District.

Whittier needed a way to apply differentiated policy across their student and staff populations, somehow managing access for both personal and corporate devices, all without increasing IT resources. Karen called Cisco, and two weeks later her team was deploying the Cisco ISE, implementing a single point of security policy for their networks across wired, wireless and VPN. Considering that Richard Nixon, the 37th president of the US went to Whittier High School, the flexible network access enabled by Cisco ISE may be empowering the next generation of leaders, scientist or artists. But, mobile devices aren’t confined to education. San Antonio Water System, a public utility owned by the city of San Antonio, is seeing surprisingly similar issues.

Read More »

Tags: , , , , , , , , , , , , , , , , ,

Protect Your Data No Matter Where It Is

Business-critical data should be secured at each point along its path—from remote devices to its destination

Although some security incidents are caused by malicious individuals, many data breaches are actually the result of a careless mistake or simple forgetfulness on the part of an employee that is then exploited by a hacker. An unsecured smartphone lost in the airport can allow anyone access to email accounts, for instance. Or a laptop with outdated antivirus software can easily be compromised by new attacks.

Regardless of how it happens, a data breach can suddenly put your company’s business-critical information at risk. With more information now in the cloud and places other than your own network, to fully protect your data, you need to make sure it’s secured in three places: on your employees’ devices, while in transit between those devices and the Internet, and at its destination, including possibly a service provider’s environment. Read More »

Tags: , ,