BYOD

February 5, 2014

SECURITY

Can You Guess Your ROI on Your Secure Access?

1 min read

Cisco commissioned Forrester Consulting to examine the business value and potential return on investment (ROI) enterprises may realize by implementing Cisco Identity Services Engine (ISE)—a leading secure access solution. This is available in the recently published Forrester TEI (Total Economic Impact) Research. Four customers were interviewed for this study and covered use cases for policy-governed, unified access across the following use case scenarios: guest services; BYOD; full access across wired, wireless, and VPN; and policy networking. The calculation was based on a composite organization of 10,000 employees that reflected the four interviewed customers from higher education, utilities, and financial services markets.

February 4, 2014

NETWORKING

Don’t Miss: [Webinar] Preparing K-12 Networks for Common Core Feb 5

1 min read

If you've worked on a K-12 wireless network, you'll know that one of the main customer careabouts is adapting to Common Core Standards. Online testing and BYOD places even...

February 4, 2014

GOVERNMENT

User Behavior and Training Critical to Secure Mobility

1 min read

Worker mobility has become an essential practice for government agencies. From teleworking on the road to accessing critical data on your smart phone, mobility increases productivity and employee satisfaction. And the trend toward mobility is growing. In fact, the Cisco Visual Networking Index predicts there will be more than 10 billion mobile devices worldwide by […]

February 3, 2014

SECURITY

Taking Complexity Out of Network Security – Simplifying Firewall Rules with TrustSec

3 min read

Bruce Schneier, the security technologist and author famously said, “Complexity is the worst enemy of security.” We have been working with some customers who agree strongly with this sentiment because they have been struggling with increasing complexity in their access control lists and firewall rules. Typical indicators of operational complexity have been: The time that […]

January 30, 2014

PERSPECTIVES

Summary: Crossing the bridge – Five cloud services you should pay attention to

1 min read

A number of key applications consumed by businesses through premise-based deployments are now available from the cloud. Irrespective of where you are in the evolution to the cloud, here are five services that are worth your attention. Read my full article for a closer look!

January 30, 2014

NETWORKING

Is Your K-12 Network Ready for Common Core Standards?

1 min read

What do IT and K12 Common Core Standards have in common? Forty-five states, the District of Columbia, four territories, and the Department of Defense Education Activity have adopted the...

January 23, 2014

SECURITY

Security Realities of IoT (Internet of Things)

2 min read

Are you a security professional or IT professional just resolving the security issues with BYOD (bring-your-own-device)? Watch out, BYOD was a precursor or warm up exercise to the tsunami just hitting your shores now. The SANS Institute just completed a survey on the security viewpoints on IoT, predominantly with security and IT professionals. 78% of […]

January 17, 2014

PARTNER

Cisco Partner Weekly Rewind – January 17, 2014

1 min read

Each week, we’ll highlight the most important Cisco partner news and stories, as well as point you to important, Cisco-related partner content you may have missed along the way.

January 17, 2014

NETWORKING

Going to Cisco Live Milan? Two keynotes to check out!

2 min read

Tuesday of CiscoLive Milan (#CLEUR for the Twitter among you) the keynotes will be wall to wall Rob with Rob Lloyd at 9:30 followed by Rob Soderbery at 11:15.  These should be pretty interesting and give you a good foundation to where Cisco is headed overall and specifically in our core networking. Opening Keynote with Rob Lloyd,President of […]