Last week’s blog highlighted ways you can improve the user experience by preparing your network to meet the challenges associated with the sea of devices entering the corporate networks. Ultimately however, productivity is not only going to be depended on the freedom to choose a device, or the ease of access to information, or the quality of the connection when consuming bandwidth intensive content. It will largely be depended on the tools available on those devices – in other words “the apps”.
Most desk-bound knowledge workers will be quite content using existing productivity tools such as word processing, spreadsheet, or presentation software already available in the various app stores. There will however be many other types of workers that can tremendously benefit from having applications that are turbo-charged with network intelligence.
What do I mean by that? Well, you will just have to watch the video where Jagdish Girimaji, product manager for the Mobility Services Engine (MSE), outlines what network information can be exposed to make tablet applications more intelligent.
Ok, so maybe you are starting to give in to the idea that, employees bringing personally owned tablets at work, is indeed not a fad and you have to deal with it. You have decided on a BYOD strategy that protects company and network resources, while (mostly?) satisfying user appetite for connectivity anywhere from any device.
Great! Now. Is your 802.11n wireless network capable of delivering the user experience that is associated with these new sleek gadgets?
If you thought your network is “good enough”, then think again. This client wave is about to disrupt everything in multiple ways.
First, more devices on the network translate to significantly higher demands for bandwidth. In many cases bandwidth requirements can grow exponentially because the ratio of user to devices is no longer 1:1 but 1:2 and often 1:3. We therefore expect to see network utilization significantly rise over time.
Second, tablet form factor now allows users to truly be mobile. Unlike laptops, users can now walk/move and be productive at the same time. This new type of behavior will increase the number of clients roaming between access points.
Finally, it has been observed that tablets are primarily used for content consumption (as opposed to creation), and video is one of the predominant types of content being consumed, which further complicates bandwidth issues, but also creates new challenges.
This week I’m happy to continue our customer guest-blog series with Blake Krone, CCNA Wireless, CCNP Wireless, and CCIE Wireless candidate. You can read more from Blake on his blog, Digital Lifestyle or connect with him via Twitter @blakekrone. Read on for a Cisco Live perspective from a true wireless professional.
Recently 14,000+ technology geeks invaded Las Vegas for Cisco Live! 2011 at Mandalay Bay Convention Center. For me this was my 4th year in a row attending Cisco Live! and the 2nd in a row at Vegas. If you have never attended a Cisco Live! event in person I strongly suggest that you try to budget for it next time around. Not only is this the best week to jump head first into all areas of Cisco’s product portfolio but it is also an opportunity to see how the products can come together to provide connectivity for devices and people.
For every Cisco Live! event that is held Cisco builds their own network to support the conference attendees, sponsors, and speakers. This gives Cisco the opportunity to get a large set of data points regarding their products performance in abusive conditions. Lately we have seen or heard about the BYOD (bring your own device) phenomenon that is sweeping across the enterprise network and there is no better place to see that than a large IT conference.
One can safely assume that for all the 14,000+ in attendance each person will have at least 1 Wi-Fi connected device. Now let’s assume that a large chunk of those in attendance are like me and also have their laptop and a tablet with them, that’s a lot of connected devices to support! Whenever I talk with customers about wireless deployments the first thing I will say when we get to the point of turning on a network is that the client will cause the best wireless network to fail. We always push to make sure that the latest drivers are applied to the devices going to be used to ensure proper roaming and performance. But how do you manage that when you have no control over the devices being used? In the future we’ll use tools like Cisco NCS and ISE, for now we just hope it works!
Each year a considerable part (up to 30% in some cases) of IT budgets is funneled towards device troubleshooting. It is no surprise therefore that after security, maintaining lean operational efficiency is the next most frequent concern regarding enabling a BYOD (Bring Your Own Device) model.
Suppose you have allowed personal devices to connect on your corporate network, and you get a helpdesk call from a disgruntled employee that can’t access certain resources. How would you go about addressing the issue? In this video, Saurabh Bhasin, Product Manager of the Cisco Prime Network Control System (NCS) – a newly launched platform for unified wired and wireless network management – answers the troubleshooting question.
Allowing personal devices on the corporate network can make any IT professional cringe. Security is naturally a top concern – and the topic of today’s blog.
One dimension of security is about enabling network access. To do that properly, you would need to design and enforce a mobile device access policy, which may include attributes such as: what the device is, who the user is, where and when access is requested, and the health (posture) of the device. Another dimension of security is about maintaining overall device integrity regardless of the network (corporate or otherwise) it connects to.
In this video we only address the first. Cisco’s solution is based on a newly launched product, the Cisco Identity Services Engine (ISE). Watch the video to learn:
What is the Cisco ISE?
Can I treat corporate devices differently from personal ones?
What about guests in the organization, do I need a separate system?