Cisco Blogs

Is Your Network Flexible and Secure?

- May 17, 2011 - 1 Comment

Remember the old days when work meant sitting at your desk, typing away at your desktop computer, at the office? There was no such thing as a smart phone or even a laptop or a tweet – you just sat at your desk and waited for the network, which was probably running at 56k dial-up speeds or slower. (Now I probably sound like my father who told me he had to walk uphill to school in the snow every day.)

These days, we don’t need to be tied to a desk, but we also expect much more of our networks: they need to be fast, secure, run the applications we need, and allow employees to work anywhere, anytime, and on any device.

So how to design an enterprise network with enough flexibility and security to address users’ needs without CIOs and IT managers having coronaries in the process? And how can enterprise networks live harmoniously (and securely) with our many devices, from smart phones to iPads to laptops?

As we continue the Seven Myths of the Good-Enough Network series over on Silicon Angle, Cisco’s Mike Rau–Vice President, CTO for the Borderless Network Architecture–tackles those questions and more as he dispels the second myth: bolt-on security.

What exactly is bolt-on security anyway?

“Bolt-on security typically consists of one or more point products that don’t really communicate with each other and don’t share information, which makes it difficult to create consistent security across the entire IT environment, a sort of Frankenstein network,” according to Mike’s blog post.

Head over to Silicon Angle to read his entire post covering the state of network security as it relates to cloud, potential network security risks, and ways that an integrated architecture can safeguard networks, not to mention make life easier for IT managers and employees.

Mike will dispel myth number three “the application and end-point ignorant” next week.

But until then, what are some of the “good enough” myths that you’ve been hearing? And do remember the days of the 56k modem? (I don’t miss those days!)


In an effort to keep conversations fresh, Cisco Blogs closes comments after 60 days. Please visit the Cisco Blogs hub page for the latest content.


  1. wow, Just by dialing existing phone numbers, customers who have deployed Cisco IME in their networks can securely extend the rich collaboration features they enjoy inside their own networks (e.g., video, wideband audio, rich caller id) to interactions with customers, partners, and suppliers who are Cisco IME-equipped. Polskie Randki