Get unprecedented visibility with Cisco and Intel Connectivity Analytics
Announcing Intel Connectivity Analytics on Cisco Catalyst and Meraki wireless platforms — providing wireless teams the advanced visibility necessary to quickly investigate and isolate client-side issues at scale, and to deliver optimal wireless experiences for enterprise laptops.
Benefitting from Renewal: What’s new in Cisco DNA Software Subscriptions for Access
Cisco continues to deliver on our promise of innovation. See what's new in Cisco DNA Software for Switching and Wireless.
Wi-Fi 7 needs refinement to enable network infrastructure-based management tools for enterprise & industrial use
Wi-Fi, based on IEEE 802.11, has developed over the last 20+ years to address the needs of an increasingly diverse set of use cases.
Cisco Catalyst 9100 series, much more than Wi-Fi connectivity
Cisco Catalyst 9100 Access Point is much more than Wi-Fi connectivity, it’s a multi-function and multi-purpose platform for Innovation, capable of enabling multiple wireless technologies.
It is time to deprecate and replace Wi-Fi (un)Protected Setup!
The Wi-Fi industry has had a long history of continuous improvement of Wi-Fi's security features (WEP to WPA to WPA2 to WPA3), with only the occasional hiccup on the way. Wi-Fi Protected Setup represents one such hiccup. It is now time to put a plan in place to deprecate and replace Wi-Fi Protected Setup in the 2.4/5 GHz bands, and avoid any use in the greenfield, 6 GHz band!
Too Fast Too Furious with Catalyst Wi-Fi 6 MU-MIMO
Catalyst Wi-Fi 6 MU-MIMO significantly ameliorate network capacity. It provides more than two folds gain in throughput, which can fulfill high-bandwidth application requirements.
If you can’t trust a MAC address, what can you trust?
The concept of random and changing MAC addresses is not brand new, but is beginning to have a real impact on how network tools operate. The idea that operating system vendors are providing users with increasing privacy by making it harder for big corporations to track them is a double edged sword. How can networking tools continue to provide critical services such as network access control, guest and BYOD services in an environment where the identifier of the endpoint, the MAC address, is no longer stable.