Cisco Blogs


Cisco Blog > Education

[Cartoon Catalyst Blog Series] K-12 BYOD. Secure Students, Determine Internet Access, and Yet Provide Awesome Network Performance?

So many students, so many devices, yet zero increase in number of IT staffers. The increasingly unbalanced ratio is enough to cause a few nightmares for any IT professional.  Luckily, supporting student IT requirements, while remaining secure, has become a bit simpler with Identity Service Engine (ISE)  Policy Deployment, part of Cisco BYOD Solutions for K12 Education.   With ISE, IT staffers can quickly add and support student’s devices like laptops, smart phones and tablets and at the same time ensure the protection of student information access, dynamically control who gets access to what and provide optimal network user experience.  You can be rest assured that we have your back while you balance it all.

K-12 TightRope1    

Protection of Minors – Let’s face it – K-12 means we’re talking about minors, so we need to tread quite carefully. Extending network access across wired and wireless opens education to a world of innovation; yet it also opens the network up to security threats. 64% of parents feel it is a schools responsibility to effectively teach students how to use their mobile devices safely [Info graphic].  Protection of access to and access by students is a high-priority.  It is critical to restrict access to confidential student records while making sure students get the right access to resources they need for learning. The ISE component of the  K12 BYOD Solution protects student information through secure,   role-based, application access – simply -- over the wired and wireless infrastructure. Read More »

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

Partnering with Apple on BYOD and Great User Experience

Mobility extends beyond devices. Yet, having the right devices and choice of devices allows us to work the way we’d like. In fact, Cisco is one of the world’s largest enterprise users of Apple products. Employees have purchased 33,000 iPhones and 16,000 iPads as part of Cisco’s BYOD program, and almost half of our regular employees are using Macs.

Recently Cisco’s Sheila Jordan, Senior Vice President of Communication and Collaboration IT spoke with Apple about BYOD, as part of Apple’s Tech Talk series. Here she and Brett Belding, Senior Manager, Cisco IT, discussed what’s behind Apple’s popularity at Cisco. They also address what enterprises like Cisco can emulate  what Apple has created for consumers in terms of user experience and bring that into today’s mobile enterprise.

Check out Sheila’s blog “Partnering with Apple on BYOD and Great User Experience” where she discusses the Apple Tech Talk and Cisco’s mobile and collaboration strategy.

Tags: , , , , , , , ,

Wireless Controller Redundancy with No Client Reauthentication Needed

July 12, 2013 at 5:00 am PST

Last fall, I blogged about No SSID Outage or Access Point Stateful Switchover introduced with the AireOS 7.3 release whereby if your wireless LAN Controller fails due to some hardware failure, thousands of Access Points fail over sub-second to the standby controller! This is possible due to continuous synchronization of CAPWAP states, Configuration Changes, Radio Channel and Power, Roaming Keys and Access Point licenses between the two Controllers. This means even if the administrator changes the configuration, channel plans or the clients roam and the primary controller fails; the Access Points will simply fail over in a stateful fashion to the secondary. In this blog, I will share details on the upcoming enhancements to High Availabilty with the 7.5 release.

In the upcoming AireOS 7.5 release, we take High Availability to the next level with two critical enhancements.

1. Today, after Access Points fail over from the primary to the standby controller, each client tries to re-authenticate and the standby controller then checks against its CCKM database whether the client has already authenticated. At the rate of several tens of authentications per second, it can take anywhere from zero to a few hundred seconds for the tens of thousands of clients that are connected to a controller to re-authenticate. The client stateful essentially eliminates this downtime with sub-second failover. Thus the total downtime that any user running a voice-call or Citrix session experiences is 2-3 seconds that the application requires to reconnect.

sso1 Read More »

Tags: , , , , , , , , , , , , , , ,

More on Cisco’s Connected Mobile Experiences in Nice, France

Last month I wrote about the Connected Mobile Experiences deployment in Nice. One of the most interesting things I saw at the iCity launch in Nice was a real cool application that can leverage the power of Cisco’s Connected Mobile Experiences (CMX) solution to deliver very unique and exciting capabilities.

Imagine visiting a city and being able to leave your friends digital messages that only they can read when they get to a specific location. Or walking into a new area and getting localized information right then about a specific event. Or customizing signage in whatever language in native to the visitor. Imagine being able to create your own sticky note and making it public or private anytime anyplace electronically.

mandarine-translated-trimmed

All of these things are just some of the possibilities that are now made available using ‘digital graffiti’ from a small startup in the South of France called Geekgaps.

Read More »

Tags: , , , , , , , , , , , , , , , , , , ,

Enterprise Apps: The Next Wave in Mobile Transactions

Earlier this year, I was having a business dinner with an important client in London when I received an IM on my iPhone. The message was from a Cisco colleague, and it said, “I need you to approve a purchase order. Right now.”

So I stepped away from the table, launched an app on my iPhone, read the purchase order, and clicked “approve.” Then I returned to my seat and went back to our dinner without missing a beat. The whole process took maybe two minutes.

Just a few years ago, this transaction would have required a laptop tethered to the network in a hotel or office, and it would have completely disrupted the dinner.  This pace of change, leveraging mobility solutions, across IT is unprecedented.

Why are so many businesses turning to mobile enterprise apps? According to Gartner, more than 25 percent of enterprises will have an app store by 2017. Mobile apps are making the promise of BYOD a reality. People love their apps and the highly personalized experience they deliver. By bringing their own devices to work, people can enjoy their work more, use the devices they choose, and do their jobs better and faster—from anywhere. According to Cisco’s latest study, the Financial Impact of BYOD, they can also be more innovative and productive.  At Cisco we firmly believe that work is a thing you do, not a place you go.  Read More »

Tags: , , , , , , , ,