Cisco Blogs

The Promise of Borderless: Richer Ways to Interact with Customers, Partners and Employees

March 17, 2010 - 6 Comments

Today we announce the second phase of Cisco’s Borderless Network Architecture: Borderless Access. This represents a giant leap forward from what we unveiled this past October when we rolled out our initial vision of this architecture. With this new phase, we’re introducing innovations across our switching, routing, security and mobility portfolios that open up richer ways for customers, partners and employees to interact and work—anytime, anywhere, anyplace, on any device—securely, reliably, and seamlessly.

IT organizations are having a trickier time than ever trying to keep their networks up and secure. But not only that, end users’ expectations have risen while their tolerance has lessened when it comes to video that hangs or being unable to collaborate with others however they want. To meet these new demands, Cisco is introducing key network services that can help your business achieve new levels of innovation, dramatically reduced TCO and energy savings, and a seamless, secure network experience. All in one end-to-end architecture.

It’s an exciting time to be in networking. Last week, I saw a headline that pondered what the next “it” will be for IT. My bet is on wherever Borderless Networks can take us.

If you’re reading this post early enough, please join our webcast—on Wednesday, March 17 from 10:00am-12pm Pacific Time. Or, learn more at

In an effort to keep conversations fresh, Cisco Blogs closes comments after 60 days. Please visit the Cisco Blogs hub page for the latest content.


  1. Connect anyone, anywhere, using any device, to any resource, securely, reliably, and seamlessly.The only possible way to do this is Cloud technology.It means existing infrastructures needs to be re-configured to keep a pace with this new advance technology and this will surely add great amount of cost to companies.

  2. Are we talking about cloud computing?

  3. Did the March 17th webcast get recorded? Where can I get a link to listen to it?

  4. Like you said, the key is keeping those IT networks up and secure. Technology has to advance hand in hand with security features. There are too many hackers out there worldwide trying to mess things up.

  5. With the strap line,Connect anyone, anywhere, using any device, to any resource, securely, reliably, and seamlessly.""You're bound to have any organization listening!"

  6. This looks like a really good featured cloud based solution, with a standard easy to use interface, which is great.