Cisco Blogs


Cisco Blog > Data Center and Cloud

The Cisco IT Story: ITaaS with Cisco Prime Service Catalog

We had some exciting sessions featuring Cisco Prime Service Catalog at Cisco Live Milan a few weeks ago. In case you missed it, we featured two great customer case studies.

One of them was Steria, a multinational service provider headquartered in France who has deployed Cisco Prime Service Catalog and FlexPod for their cloud services and innovative Bring-Your-Own-Device (BYOD) solution: “Workplace on Command.” You can click here to download their Cisco Live presentation, and check out their written case study here.

The other customer we featured was a Fortune 100 enterprise: none other than our very own Cisco IT.  The Cisco Live presentation about their internal IT service catalog deployment (dubbed “eStore”) is here – you can also read a detailed case study write-up here.

estore1

[Screenshot of eStore: the Cisco IT deployment of Cisco Prime Service Catalog]

Adel du Toit, who heads the Cisco eStore project, wrote a blog post about Cisco IT’s initiative here last June.  Led by Adel and her colleageues, the internal Cisco IT eStore has been rapidly evolving, and has been deployed for a variety of use cases, including BYOD, mobile apps, collaboration, communications, desktop services, employee onboarding, networking, data center computing, and much more.  Powered by Cisco Prime Service Catalog together with Cisco Process Orchestrator for automated service provisioning, the eStore is the “one stop shop” for all IT services within Cisco.

estore2

[Cisco IT’s eStore: a unified IT service catalog for all internal tools, apps, and services]

Recently, the eStore upgraded to the latest version of Cisco Prime Service Catalog, version 10.0. The eStore has also rolled out a mobile user interface that allows Cisco employees to download mobile apps to increase productivity and reduce unproductive approval cycles.

estore3

[The Cisco IT eStore mobile version]

 This has enabled Cisco IT to provide a consumer-oriented shopping experience for IT services to all our employees, not unlike their experience as consumers with Amazon.com and the Apple App Store.

Interested in learning more? Join us on February 26th at 11 am EST / 8 am PST to learn more about how Cisco IT is automating IT-as-a-Service via the eStore and Cisco Prime Service Catalog. You can register here: http://cs.co/6014eN9j.

And don’t forget to follow @CiscoUM and @CiscoIT for the latest updates.

Tags: , , , , , , , , , , ,

Inside Cisco IT Takes You on Our Security Journey

Would you jump on a horse without consulting someone else who is at least somewhat familiar with horses?  You know, like a cowgirl or boy?

Probably not.

At least not if you’re interested in staying in the saddle versus tumbling to the never-soft earth.

While Cisco IT doesn’t have any expertise in horseback riding (I mean, you are welcome to ask me for a couple of pointers, but I’m not promising results), we DO have expertise in a variety of challenges IT departments face on a regular basis.

Like Security.

Last week, we hosted a live Inside Cisco IT Webinar on our Security Journey with two of our own Cisco IT Security Experts.  If you missed it, you should definitely give the recording a gander.

After checking out the recording, this is what you should come away with:

Security Webinar Key Takeaways

Tags: , , , , , , , ,

Learn How to Build an Intelligent WAN at CiscoLive Milan

live-milan-header

Missing CiscoLive? Learn what’s new!

According to the Open Network User Group (ONUG), a consortium of IT leaders including Bank of America, Fidelity Investments, JP Morgan Chase, UBS, and Gap, among the top priorities to reduce network expenses was WAN management, coming it at #3

This should not be a surprise with the growth of bandwidth demands from cloud, mobility and rich media applications like video. In fact, 68% of IT decision makers expect their WAN demand to grow. However, few (1 of 4 IT organizations) will have addition budget to pay for it.

Next week, over 5000 IT leaders will be meeting at CiscoLive Milan to find out how to prepare their organization for the opportunities ahead, and build a next-generation network. One essential element is building out a next-generation WAN.

For attendees making their way to the show, here are few sessions and demonstrations to note in your show planner.
Read More »

Tags: , , , ,

Curious About Cisco and Facebook’s Partnership for Wi-Fi?

More and more organizations across industries are realizing that providing simple, easy Wi-Fi for customers, guests, visitors, and more is becoming a basic expectation. Consumers are used to their always-on, always-connected lifestyles, so naturally their checklist for any venue they step into will now include “Wi-Fi” as a top priority. Good thing Cisco has not one but two simple ways for organizations with venues to provide easy Wi-Fi access for their consumers. One is CMX Connect, which you read about in the MSE blog series. The other is CMX for Facebook Wi-Fi.

We announced our partnership with Facebook last October to help connect businesses with their consumers at Interop New York. This Wednesday, January 22nd, we are having a special live webinar to give our customers a deeper dive into the Cisco and Facebook Wi-Fi solution.   Register to join us at 10am PST!

Don’t miss this opportunity to hear from Cisco and Facebook speakers, as well as a special guest customer, to learn more about our joint-solution. Hear how CMX for Facebook Wi-Fi can help boost recognition for your brand, foster stronger relationships with customers, and promote your business by connecting you directly to customers through Facebook.

Click here to register.

Tags: , , , , , , , , , , ,

Beware: Insider Threats Getting Worse

December 18, 2013 at 5:00 am PST

Most recently ESG/Vormetric came out with a threat report that highlighted the increase in insider threats & the significance to augment perimeter and host-based security. The rationale behind the increase was that more people are accessing the network, increase cloud and network traffic are making it difficult to isolate the problem.

Almost 50% of the organizations believe they are vulnerable to insider attacks and have or plan to invest dollars.

This is alarming!

The top methods noted for these insider threat vulnerabilities were abuse of access by privileged users, contractors, and other employees. Security professionals are finding it quite difficult to monitor the users, traffic, ports, etc to identify and mitigate insider threats. They must glean this information from multiple sources and many times need to translate the data. For example, “whose IP address is this and why is Mary from finance, who is supposed to be on vacation, downloading data from the payroll server?” This process slows the resolution time. The criticality of this type of contextual information is enormous to remediate quickly.

Security needs to be pervasive and consistent to manage these inside threats—so how does one do this? Integrate security into your infrastructure (wireless, wired, VPN)! Once security is woven into your infrastructure it provides the visibility and clarity to respond in a timely manner with a high degree of efficacy and is not dependent on distinct and isolated ingress points.

Read More »

Tags: , , , , , , ,