Cisco Blogs


Cisco Blog > Enterprise Networks

Converged Access Simplifies Wired-Wireless Management at Camden Schools

The Camden City School District in New Jersey is made up of 26 Schools with camden blogapproximately 29 buildings that cater to 12,000 students and 2500 employees. The School District decided to go with Converged Access to enable a single pane of glass for the wired and wireless network, and drive better network performance with 802.11ac.

The Converged Access deployment at the School District is based on Catalyst 3850 and drives 30 Access Points in each Elementary School and 60 Access Points in each High School. Each building has three Catalyst 3850 switches per IDF,  with one switch acting as a Mobility Controller, and others acting as Mobility Agents. They currently deploy Read More »

Tags: , , , ,

Is your WAN Stressed Out? Take the Intelligent WAN Workout

If you have been following Cisco Blogs, attending CiscoLive, or reading industry publications like Network World,  you’ve probably heard about Cisco’s Intelligent WAN or IWAN solution. For those of you that haven’t been in the loop, have more questions, or are just plain curious about the Intelligent WAN, we have a short webinar series kicking off on the 6th of November at 10am PST.  We will cover the important building blocks for architecting your hybrid WAN infrastructure including:

  • Defining the Hybrid WAN
  • In-depth technical analysis of Cisco’s Hybrid WAN Solution: IWAN
  • How IWAN can help to lower your IT costs

If you belong to an IT organization that is centralizing applications in the public or private cloud to gain efficiencies or are migrating the Internet edge in your branch offices to take advantage of software as a service (SaaS) applications, then make sure you attend this live 60-minute webcast, the first of a  four-part series.  We will show you how a hybrid WAN architecture can help you deliver a consistently high-quality end-user experience while actually reducing your WAN operating costs.

Still not sure if IWAN is for you? Consider these other trends that might be happening in your enterprise network today that could end up causing many sleepless nights in the future:

  • Mobile devices continue to proliferate, and high-bandwidth applications such as video are becoming more and more commonplace, putting pressure on the WAN.
  • According to Nemertes, most organizations’ WAN budgets will remain flat or decline in 2015, meaning that adding bandwidth is often not an option.

Join our Cisco experts and bring your questions with you!

WANwebcast

Tags: , , , , , ,

Mobility Means New Business Opportunities

We are living in a new mobile world evolved from the convergence of two separate mobile experiences: our cellular (mobile voice) world and our Wi-Fi (mobile data) world.

Bob Friday 1We’ve seen these changes in mobility transform business operations and create new opportunities for businesses like MGM Resorts International in hospitality. The question that now remains is how will your business capitalize on these new opportunities and keep up with the competitors in your vertical?

Developing a comprehensive mobile strategy will be key to staying competitive in this new mobile internet world. It’s an approach that requires more than keeping the lights on or running the business as usual. It’s changing the way we think about mobility and what it can do to transform your business. From leveraging mobility-enabled location-based services to empowering a mobile workforce through BYOD, the right strategy can reap rewards for years to come. Read More »

Tags: , , , , , , , , , ,

Honesty is the Best BYOD Policy

Does BYOD really mean that my device will become the company’s device? Do I control my private data or does my employer? How can I make sure I maintain a work-life balance when my personal device is also my work device? Will my company support any device I choose?

Some of these questions might seem familiar as more business employees consider adding their own device to their company’s network. These questions also represent an important part of a comprehensive mobile strategy: User buy-in.

Brett Belding BYOD - without headerRecently, I read an interesting CIO article by Adam Bender that highlighted the importance of getting employees on board when implementing a BYOD policy. The article discusses that according to Frost & Sullivan analyst, Audrey William, many employees are worried that they won’t be able to control data on their device once they begin using it for work. In addition, William states that employees are also concerned about the lines blurring between work and play when both personas are merged onto one single device.

Although the concept of BYOD is not new, these concerns have important consequences in our networked world. So, what’s the answer?

An honest, safe, and secure MDM solution and effective policy communication. Read More »

Tags: , , , , , , , , , , , , , ,

Mobile Devices Will Transform Your Business IT

There’s no question that more people around the world are connecting to wireless networks at home, work and play via mobile devices, such as smartphones and tablets. This rise in mobile device usage begs the question: How soon will it be (if not already) before these mobile devices dominate the mobile network, especially in the workplace?

Chris Spain - with header FINALJust recently, I read an article in Forbes, by Louis Columbus, that addresses the issue of increased mobile devices and unprepared network infrastructures. The article examines a study by IDC that predicts that 87% of sales for connected devices will be tablets and smartphones in next four years. As many employees prefer working from their own mobile devices, corporate networks, as they’re currently designed, will not be capable of successfully managing such a large volume of mobile data traffic generated by these mobile devices. With such expansive growth expected, the majority of businesses will either need to adapt an existing strategy to support this increase in mobile devices or adopt a new strategy.

Currently, there is a clear need for enterprises to better prepare and invest in their IT infrastructure. As more employees use their own devices at work for business and personal use, it’s imperative that business organizations require a secure mobile device and BYOD strategy to accommodate their business needs and employee preferences. However, the decision to adopt BYOD comes with a set of challenges for IT organizations.

Many of the benefits of BYOD, such as having the choice of device and anywhere, anytime access, are somewhat adverse to traditional IT requirements for security and support. In the past, IT pre-determined a list of approved workplace devices, typically a prescribed desktop, laptop, and perhaps even a small, standardized set of mobile phones and smartphones. Employees could choose among these devices, but generally were not permitted to stray from the approved devices list. With BYOD, IT has to approach the problem differently. Read More »

Tags: , , , , , , , , , , , ,