Today we have a special guest post by Andrew vonNagy, CCIE #28298 (Wireless), author of the blog Revolution Wi-Fi, Twitter @revolutionwifi and a Cisco customer. Huge thanks to Andrew for taking the time to share his Cisco Live experience!
Last week Cisco Live! 2011 took place in Las Vegas, NV. This year was my first time attending the conference, and I am a bit amazed at my experiences looking back on the event now that it is over. In addition to the deep technical content the conference is best known for, I found more valuable benefits are afforded to attendees willing to take a more active role in the technical community.
Arguably, the most valuable aspect of the conference is the opportunity for professional development through interaction with influential members of the industry, both internal and external to Cisco. Professional networking provides a foundation for growth and success by drawing on the energy of a collective group of friends and associates who share similar ambitions and have a drive to be successful, enabling the group to move forward as a whole. Building communities within the industry is when the magic starts to happen. Joining these communities can provide access to shared knowledge, creation of new and exciting opportunities, leveraging of broader connections throughout the community, and promotion of valuable content, products, or services created by trusted members within the community.
Many of these communities begin as virtual communities, built on social media platforms such as Twitter, LinkedIn, Facebook, and the rapidly growing Google+. These platforms enable greater access to members within the community, but must be used appropriately to be effective. Individuals trying to join the community must provide value to the larger collective and interaction must be genuine. A quote from a widely successful writer and blogger comes to mind…
Networking is always important when it’s real, and it’s always a useless distraction when it’s fake. – Seth Godin
Industry events, such as the Cisco Live! conference, bring the virtual community together allowing attendees to build on existing relations formed online and expand on them by providing more personal interaction, helping to form more meaningful relationships.
Each year a considerable part (up to 30% in some cases) of IT budgets is funneled towards device troubleshooting. It is no surprise therefore that after security, maintaining lean operational efficiency is the next most frequent concern regarding enabling a BYOD (Bring Your Own Device) model.
Suppose you have allowed personal devices to connect on your corporate network, and you get a helpdesk call from a disgruntled employee that can’t access certain resources. How would you go about addressing the issue? In this video, Saurabh Bhasin, Product Manager of the Cisco Prime Network Control System (NCS) – a newly launched platform for unified wired and wireless network management – answers the troubleshooting question.
Allowing personal devices on the corporate network can make any IT professional cringe. Security is naturally a top concern – and the topic of today’s blog.
One dimension of security is about enabling network access. To do that properly, you would need to design and enforce a mobile device access policy, which may include attributes such as: what the device is, who the user is, where and when access is requested, and the health (posture) of the device. Another dimension of security is about maintaining overall device integrity regardless of the network (corporate or otherwise) it connects to.
In this video we only address the first. Cisco’s solution is based on a newly launched product, the Cisco Identity Services Engine (ISE). Watch the video to learn:
What is the Cisco ISE?
Can I treat corporate devices differently from personal ones?
What about guests in the organization, do I need a separate system?
Hope you found last week’s inaugural blog on the “Tablet Welcomed.” series interesting enough to come back.
Today, I am sitting down for an interview with Brett Belding, who was instrumental in designing a mobile device access policy for Cisco, in his role as the Senior Manager of IT.
I met Brett over Cisco Telepresence one early morning (when I typically I am still asleep, let alone in the office) to accommodate his Eastern time zone schedule. For the videophile readers, I should say that I pointed my camera directly to the Telepresence screen, which is why you may notice my reflection at certain points. However, this amateur video alone could be a case study for the quality of Cisco Telepresence.
Eighteen months ago, when the original Apple iPad was announced, I posted a blog here posing a simple question: “Apple iPad, in the enterprise?” The obvious answer, to me at least, was a resounding “Yes”. Today, it seems that professionals and employers alike would agree. The former like to bring and operate their own devices at work, and the latter are buying these devices to boost employee productivity.
In this six-part blog series titled “Tablets Welcomed.” I will be posting short video clips (3 questions in 3 minutes) of interviews with Cisco leaders, that walk you through the Cisco solution for providing access to any device, securely, reliably, and seamlessly.
Today, I am talking to Tom Wilburn, Vice President of Sales for Cisco Wireless, who has experienced this market transition firsthand. Watch Tom here as he answers:
- How has the influx of new mobile devices changed IT?
- What are the consequences companies need to confront?
- What are some compelling tablet use cases?