Avatar

If you’ve been following Mobility you’ve probably read a blog or browsed a website touting the importance of the transformation to 5G. Research 5G a bit further and you’re likely to find volumes of information about the evolution of the radio access network (RAN) and exciting possibilities with virtualization. Such a large offering of cutting edge technology might even leave you asking yourself, “What’s the business justification for one of the most extensive transformations that mobile networks have ever experienced?”

The interest in moving to 5G is driven by a major shift in service demand. Some of the new services being addressed with 5G technologies are:

  • Broadband Access Everywhere – 1Gbps per user device with Hyper Dense Coverage
  • Massive Scale for IoT – Billions of new sensors, meters and other smart devices
  • Ultra-Reliable Communications – for E-Health, Disaster Response, and critical IoT
  • Broadcast-like Services – New forms of Media

 

For more information on 5G download our new ebook and see our 5G White Paper Series here.

A quick scan of this eBook will provide several examples of key 5G technologies that are required in addition to the RAN. While Aeneas Dodd-Noble blogged on enhancements to the Mobile Core and Mark Grayson blogged on requirements for Heterogeneity, I’m going to tee up xHaul as the third critical challenge of deploying 5G.

5G will drive new network requirements across the fronthaul and backhaul portions of your network. Some of the key new xHaul service requirements for 5G are:

  • High bandwidth – up to 1 Gbps per user and 10 Gbps to the cell tower
  • Low Latency – for Ultra-Reliable services like remote manufacturing, E-Health, etc.
  • Network Slicing – Grouping network resources at the Application and SLA level
  • Operational Simplicity – for Agility thru high levels of Automation
  • And High Scale, Reliability and Security requirements for specific services

xHaul involves the bringing together of existing backhaul and fronthaul networks to create a unified IP network. This unified approach to transport will provide support for key timing issues, like phase and frequency, as well as huge increases in network scale. The xHaul network must also be application aware and fully automated all the way from the end user to that user’s desired service or content. This mandates that the 5G network supports network slicing to carve out xHaul network resources by application and SLA. It also means that these xHaul resources are fully automated, model driven and programmable to deal with much higher levels of real time service transition or churn and some very specific latency demands.

We see 5G as a major network transition. Although 5G RAN standards will not be ratified until 2020, much can be accomplished now in preparation for the 5G RAN availability. xHaul networks are just one of the major 5G puzzle pieces that can begin that transition today. Many xHaul network migrations don’t have to trigger episodes of “rip and replace”. xHaul is a prime example of the need to complete a readiness assessment and an action plan. Cisco is eager to partner in this evaluation and describe some of the new features and solutions like Agile Carrier Ethernet, Segment Routing, EVPN, streaming telemetry, orchestration and many more that could compliment your existing xHaul network while also preparing you for the future.

 



Authors

Greg Nehib

Senior Marketing Manager

SP Infrastructure

Avatar

Effective security is simple, open, and automated.  We’ve already talked about simple and open. Now let’s talk about automated.

Security admins can relate to this scenario.

You just learned of an infected system in your environment of thousands of devices. How many others are affected? That’s hard to figure out even in elite operations. What you do know is that uncovering how big the problem is will be messy – manual, imperfect, and time-consuming.

So how can you quickly assess the situation and respond faster? Even great teams struggle to juggle dozens of product consoles, absorb the assault of thousands of rapid-fire event logs, or engage in an incident response malware goose-chase fast enough.

What you need is a simple and effective way to reduce the burden on teams while accelerating the time to detect and respond to threats. Like drones used by the military to see where the enemy is and outsmart them, to cover more ground faster. You need a force multiplier that can quickly, easily, and intelligently take action across all of your security solutions, so that you can then focus efforts where they are needed most. That’s where automation can help.

Automation can be your force multiplier.


See Once, Protect Everywhere

This concept is at the heart of how automation is the force multiplier security teams need today. See a threat in one place and call on all security technology to instantly protect against it everywhere. Instead of multiple team members hunting down details from different systems and trying to piece things together, automation removes that manual burden from teams and enables them to detect and respond more quickly. And time matters. Reducing the time and space that attackers have to operate can significantly limit the damage they can do. Automation is key to closing that window.

In addition to making security more effective with solutions that are simple and open, we are also deeply committed to incorporating automation across our entire security portfolio. Our goal is to deliver security solutions that work together seamlessly for a systemic, automatic response.  An integrated threat defense starts with products that have some automation in their own right, but that also work together for automated security across the integrated architecture.

Here are a few proofs of how Cisco is using automation to make security more simple and effective.

Automated Threat Hunting

Despite your best efforts to protect against compromise, a persistent attacker will eventually breach your defenses and get inside. What if security could automatically hunt for threats inside the network?

With Cisco Advanced Malware Protection (AMP) we can do that. The low prevalence capability detects targeted malware and prevents it from slipping under the detection radar. In two clicks, it surfaces files that were only seen by a small number of users and automatically analyzes them for malware.

Screen Shot 2016-12-19 at 10.06.47 AM

 

Automated, Cross-platform Malware Response

What if security could find and block malware on one system and then instantly block it and remove all traces of it across all of your networks and systems? Automatically. In real time. We see a threat once and stop it everywhere.

We do that today with Cisco Advanced Malware Protection (AMP). It sees a threat once on a device and instantly blocks that threat everywhere – across the entire network.  AMP also automates malware remediation. Once a file is identified as malicious, it simply takes a few clicks and then it’s gone from all endpoints.

Screen Shot 2016-12-19 at 10.36.49 AM

 

Automation Driven Solutions

How about going a step further with multiple products that integrate threat defenses for automated security? As we know, products are vastly more powerful when used together. We do that too.

Let’s start by bringing together the NGFW and the network with Rapid Threat Containment. Upon detecting a threat on an endpoint, Cisco Firepower Management Center, Stealthwatch, or Cisco AMP automatically work with the Cisco Identity Services Engine (ISE) to contain the infected endpoint. No team member needed to do this.

What about the network itself – can it automate security?  As it turns out, it can.  We call it Network as a Sensor and Enforcer  and it is another examples of Cisco products working together to automate responses. We quickly identify suspicious traffic on the network with Cisco Stealthwatch; instantly know what user and device the traffic pertains to with Cisco ISE contextual information; and then use Cisco TrustSec to automatically enforce a security policy on the network to quarantine the infected device. Only Cisco can combine the power of your network with best-in-class security products to accelerate detection and response.

 

Screen Shot 2016-12-19 at 10.39.23 AM

 

We mentioned before that making sense of hundreds or thousands of alerts or logs can be tough – and undermine security effectiveness. To ease this burden, we automatically prioritize events for you in Firepower Management Center.  More than that, it can even see what comes online and figure out what needs to be done – recommending rules, updating policies, and denying access when a threat is clear. Talk about the power of integrated visibility and control for immediate response.

To get to the point where we are as agile as attackers, we need security responses that work in real-time, all-the-time, anytime. An integrated threat defense where every piece in the security puzzle must play a part, integrated to work in concert for a systemic response. Not only does this make our good stuff harder to steal, but it makes our security more effective. Getting to this level of defense is a journey that has no shortcuts. But with our commitment to delivering security solutions that are simple, open, and automated, we are well on our way.

It may not be as cool as operating a drone, but for those of us in the security industry the outcomes are probably just as satisfying.

[We’ll have a look at Integrated Threat Defense in a future post so stay tuned for that.]



Authors

Jason Lamar

Senior Director

Security Product Management Group

Avatar

Public safety officials are facing unprecedented challenges in keeping citizens, cities and nations safe. As socially significant trends continue to arise globally, government officials must consider how to use technological advancements to reduce threats and consequences associated with our current political and cultural climate.

To address cultural trends as well as technology trends worldwide, analyst firm IDC produced the following research in partnership with Cisco. To read the full report, click here, or read on for a summary of the current trends and future of public safety and national security.

Scaling Public Safety and National Security in a Digital World -V1- US



Authors

Laura Re

Content Marketing Manager, Data Center Marketing

Ent Solutions- Data Center Marketing- UCS

Avatar

Digital transformation is a driving force in changing the market dynamics and competitive landscape for businesses across all vertical segments.  Businesses can’t wait for IT and long budget approvals to get in the game – and neither can local and state governments that must meet the increasing demands of citizens who want quicker and easier access to public services.

While the public sector may not seem like the most progressive when it comes to technology, cities at the state to global levels are leapfrogging into the digital era and raising the bar for public services.

Take Durham County in North Carolina, home of renowned Research Triangle Park, Duke University, and hails as one of the fastest growing counties in the United States serving a diverse population of county residents and businesses. Durham County’s mission is to serve its citizens and employees through engagement and collaboration by offering innovative applications and services across public safety, health, social services and administrative functions.

With a Smart City mindset and need for a digital infrastructure foundation, Durham County made its government vision a reality with Cisco’s pioneering SDN and data center technology (See related news release: Durham County Upgrades Data Center Network with Cisco ACI to Speed New Services and Applications for County Residents, Businesses, and Employees).  At the heart of it all is Cisco ACI, which enabled the County to build a state-of-the-art, automated application-centric data center.  With Cisco ACI, its Information Services & Technology (IS&T) staff can now spend less time managing the network, and more time creating innovative applications that make its local government more efficient and secure. Now, residents have quicker and easier access to public services, which helps meet the County’s accountability goals.  For example, residents can send in photos and documents to the County via a mobile app from marriage licenses to utility bills, saving time, energy and cost and fosters a green environment.

At the Gartner Data Center Summit earlier this month, Durham County took the stage with Cisco showcasing its public sector model leveraging SDN. “We selected ACI because we trusted it would become the brain of our data center,” said Seth Price, Sr. Network Manager at Durham County.

Taking it to the next level, Durham County currently has an initiative underway called OpenDurham. County developers and citizens can create applications with openAPIs for residents and businesses, fostering collaboration, engagement and openness in the community.

Price closed Gartner’s session with “…..It’s an exciting time to be a network engineer, and there is more time to innovate even at the local government level.” If a local government can reap the benefits of Cisco ACI, go digital and save taxpayer dollars, think of the potential opportunities for enterprises and big businesses. Learn more about Application Centric Infrastructure (ACI) and How Cisco ACI delivers business outcomes.

dc2

 

 



Authors

Christina Grenier

No Longer with Cisco

Avatar

When winter comes around, many people head down south to places like Miami to escape the snow, play some golf, and relax on the beach. The weather is the attraction, but on January 10-12, Miami will become a hub for a hot topic beyond just the weather: cybersecurity at the S4x17 ICS Security Conference.

Cisco is a conference sponsor this year and our own Marc Blackmer will be speaking on the topic of Manufacturers Usage Description (MUD). MUD is a proposed standard to align device makers and customers on the activities and communications that connected devices are engaged in to securely set parameters and prevent malicious hacking and the manipulation of the hardware.

As more and more devices become connected, the manufacturing industry and government officials are zeroing in on how to handle security for industrial infrastructure and the Internet of Things (IoT). How secure are connected devices? What standards are being used to help prevent malicious attacks?

MUD will be just one of the many topics addressed at the conference (you can view the full agenda here). Both IT and OT professionals looking to learn more about ICS security will find value in attending this event. Additionally, the Cisco team of security experts will be available during the conference to discuss how we can support your industrial needs, make recommendations, and help align your security priorities with your business.

We also have a discount code for our customers who are interested in attending the conference. Just leave a comment below, and someone will be in touch with the promo code.

We look forward to seeing you in Miami!

To learn more about assessing risk and setting a security strategy, visit our interactive security experience for manufacturing:

10639638_Cisco_ION_Social_moss_TW-440x220_3

 



Authors

Eric Ehlers

Marketing Manager

Manufacturing and Energy

Avatar

Part 3: What does it take to win in an OTT world?

In my previous post of this trilogy, I explained why I think that OTT video on the unmanaged network (aka. the Internet) is here to stay.

Moreover, I suggested that by combining the advantages of Video-Over-IP with those of Video-Over–Broadcast, service providers can reach a new standard in their video service.

Video-over-IP brings advantages such as personalized content experiences, extended device reach, rapid service launch, real time insights, and much more. Video-over-broadcast brings with it high video quality, robust security, and premium linear content.

What if you could get them all, TODAY, on your managed network?

Well it isn’t just a dream. You can have a platform that exceeds the standards achieved by the OTT industry.

Such a platform would be cloud-based and deliver a few key characteristics:

Be one platform to all devices – a single, modular platform that delivers video across any network, whether satellite, cable, OTT, you name it. It would support your existing legacy devices while allowing you to publish any experience, optimized for any device, as soon as it comes to market.

Offer the best video experience – with unmatched Adaptive Bit Rate (ABR) video quality while providing intelligence across network, encoding, and clients. Discovery would be transformed with relevant and personalized content that finds the subscriber.

Built to scale, delivered as a service – meeting the needs of even the largest global service providers, reducing cost per subscriber, with a large global community of customers that constantly contributes to its roadmap.

Ensure uncompromising security – that protects what is yours and delivers your content securely everywhere.

At Cisco, IP and networking is in our DNA. With our Infinite Video Platform, we are best positioned to help your video service successfully move to the IP world.

To learn more about our Infinite Video Platform, visit us at the CES show in Las Vegas. Before the show, check out this brand new Infographic and related eBook.

 



Authors

Yaron Agami

Senior Manager

SP Product Marketing, Cable and Satellite Segments

Avatar

In my previous blog, I shared four essential behaviours that leaders must employ to create a lasting, innovation-focused mindset amongst employees at every level of an organisation. In this blog, I explore four additional behaviours, which inspire employees to get behind the organisation’s innovation goals and work together to achieve them.

  1. Collaboration is ‘King’

It goes without saying that collaboration is a key part of any successful innovation strategy, but effective collaboration isn’t as easy as it may seem and requires skillful management. Innovation teams must be as diverse as possible, with each member selected for the unique attributes they bring to the table such as a particular skillset or area of expertise. Assembling teams from across the organisation helps to break down internal silos and encourage cross-departmental thinking that benefits multiple groups, not just a single entity. Also consider including customers and partners for further diversity to avoid “group-think” and ensure that problems being addressed are validated and the solutions created solve them.

  1. Rewards and Recognition Matter

An often-overlooked aspect of successful innovation strategy is that of rewards and recognition. Effective reward strategies don’t only focus on successful outcomes. Innovative behaviour and thinking is equally important and must be recognised as such. While not every idea will prove successful, encouraging and rewarding employees for thinking boldly and taking risks with their innovation ideas is the key to repeat behaviour. And it’s this repeat behaviour that ultimately leads to long-term culture change. Building innovation objectives and rewards into employee reviews will also help to maintain enthusiasm and ensure innovation doesn’t become just “another task” that needs to be addressed.

  1. Innovate Everywhere is the New Norm

Organisations must strive to keep innovation at the forefront of every employee’s mind if meaningful culture change is to be achieved. Instilling an innovate everywhere mentality is key. There are many ways that a leader can encourage this—from creating open working environments where new ideas can be explored without fear of failure to promoting a ”passionately dissatisfied” approach towards new or existing tasks. Idea generation may not be everyone’s strong suit, but innovation doesn’t begin and end with the initial idea. As a leader, you must encourage everybody to find ways to be involved. This could be refining ideas put forward by others, helping to connect teams, or simply shouting about an idea once it’s working.  Remember that everything can be improved. It’s your job to ensure an environment is created that allows ideas to be freely exchanged and evolved.

Harvey Wade Blog 3 Image

  1. Entrepreneurship Fosters Success

Finally, leaders must encourage employees to adopt more entrepreneurial behaviours in both the approach to their own role and to the future of the wider organisation. This is best done by exhibiting those behaviours yourself. Experimentation is at the core of all successful entrepreneurialism. More often than not, the final outcome is a far cry from the original idea, so even project failures are learning experiences that should be celebrated and the lessons remembered. Providing incubation training, such as lean start up and formalising expected innovation behaviours will help employees understand what’s expected from them and how they can incorporate more entrepreneurial thinking into their day-to-day activity.

The eight key behaviours discussed over the past two blogs form the focal points for any successful innovation strategy. If your current strategy is failing, the chances are one or more of these behaviours has either been overlooked, or not implemented effectively.

In my final blog in this series, we’ll look back at what we’ve learned thus far and summarise what it means in practical terms for you as a leader.

 



Authors

Harvey Wade

Innovation Program Manager

Cisco Services Innovation Excellence Center (SIEC)

Avatar

The insurance sector is being disrupted at a feverish pace. Disruptive startups never just settle for improving the current way of doing things. Instead, they focus on rapidly changing the game entirely. There are no insurers exempted from this; as digital and new technologies are creating disruptive threats at every turn.

According to the “Pulse of Fintech” Q2 2016 report, recent venture capital-backed InsurTech investments spiked to $2.5 billion of investments in 74 deals in 2015, up from $700 million in 2014.

InsurBlog

This disruptive force of the Insurance industry centers around three main topics: Customer relationships or demand, Risk mitigation, and Transformation.

 

Customers

Seamless customer centric omni-channel experience is the expectation throughout the customers’ journey: no matter whether the customer is doing initial research, finalizing their decision to buy, ordering services or considering changing their insurance policy.

Engaging with the customer regardless of method, at home, mobile or other can help insurers differentiate themselves. Customers can develop closer relationships with their insurance provider, and purchase the products they need when and how it’s most convenient for them.

Risk

IoT is fundamentally changing the way we assess and manage risk. While managing and understanding risk will never be an easy task for insurers, digitization is helping gain better visibility and insight into markets like never before. Most financial services executives list that cyber security is a top priority, yet less than 10% of companies have cyber insurance.

Insurers can gain better visibility into their customers’ risk profile, by partnering and leveraging technology insights. Using insight into large portions of the Internet, and applying non-intrusive threat analytics to develop a detailed risk assessment for specific industries and companies, can assist insurers tap into this cyber liability market.

Transform

The journey to find a business model which can leverage these new digital possibilities is more important than ever. As more and more customers transition to digital channels to make purchases and the emergence of interconnected ecosystems will be key drivers for business transformation.
Many companies have developed comprehensive digital strategies, but struggle to enable them. However, by creating a Digital Business Roadmap, companies can connect their IT and business strategies to enable key digital capabilities at faster pace. A well planned strategy, enabled by best practices and proven tactics is essential.

For more information on what Cisco is doing to help insurers handle this Digital Transformation: FSI on Cisco.com



Authors

Danny Vicente

Global Lead - Sports, Media, and Entertainment

Global Private Sector Industries

Avatar

 

IMG_2409 ovalWritten by Tim Brophy, Product Manager Cable Access Business Unit

More and more these days, service providers in the access market are talking about the evolution of their plants to a Fiber Deep (FD) Architecture. While the trend toward driving fiber into the plant and reducing RF amplifier cascades is not new, today’s discussions seem to be a harbinger of much more significant changes in the distribution plant. The changes are not only to the physical equipment, but are also shifts in both the management and the day-to-day operation of the access network. But what exactly is fiber deep and what are the changes it implies?

To appreciate the significance of fiber deep, it is useful to understand a few things. First, we need to describe the physical changes to the access plant, and the impact that has on both the operator and their customers. Next, we need to identify those operational changes that drive anticipated installation, maintenance, and troubleshooting improvements for the future. Finally, we need to look to the services and application delivery ecosystem that help a service provider navigate the options to capitalize on the benefits of fiber deep and better quantify the return on investment.

DF

At its most basic physical level, FD architectures move the optical node (the optical-to-electrical conversion point) deeper into the network and closer to the subscriber. Often also called N + 0 (for node + 0) architectures, the FD node location eliminates the RF amplifier cascades of the traditional HFC outside plant. It is worthwhile to distinguish this from a Fiber to the Last Active (FTLA) architecture, in which the final amplifier in each cascade is simply replaced with a node. The FD designs places nodes at locations chosen to equalize the number of subscribers served and minimize the disruption of upgrades. In this way, the number of new nodes and the plant efficiency (in terms of failure group size, powering, and underutilized hardware) is optimized.

Some advantages of the FD architecture are obvious: the potential 60% reduction in plant actives and commonality of hardware reduce maintenance costs and improve reliability. The changes still let a field technician leverage the familiar HFC tools and techniques. Operationally, smaller service groups increase per subscriber capacity and frees spectrum to provide new or additional services. That smaller service group combined with shorter RF cascades reduces noise in both directions, improving downstream MER (for higher order modulation efficiency gains) and reduced noise funneling in the reverse plant. But the FD topology also increases options for flexible growth. The location is optimal for aggregation and splitting of signals, laying the groundwork for Remote PHY or FTTx deployments, while keeping green initiatives and reduced energy impacts in mind.

 Fiber deep plants are just one step in an overall transition of the access architectures. As operators strive to configure services and deploy applications dynamically, robust and operationally simple networks become critical. For end customers, on-demand applications and rapid fulfillment determine their perceived quality of experience. When combined with improvements in network orchestration permitting dynamic configuration, improved modulation, and device and protocol-independent deployments, FD provides a stepping stone to the reliable and flexible link necessary for competitive success. Your Cisco account representative can help guide you through the options and planning for successful architecture implementation.

In future blogs we’ll discuss the synergies of FD with Remote PHY and the advent and significance of intelligent nodes spreading throughout the access plant, and highlight improvements in technologies that power this revolution towards Distributed Access Architectures.

See what Cisco have to offer for Cable Access HFC solutions

Save

Save

Save



Authors

Daniel Etman

Product Marketing Director

Cisco's Cable Access Business