Friday, 29 December 2017

Cisco UCS Automation Series, Part I – Getting Started with UCS PowerTool

You WANT to Automate! But Where to Start? You want to automate but not sure where to start or what tools to use or even what processes can be automated and if the thing you want to automate is even automatable. Does it offer an API? If it...

Wednesday, 27 December 2017

Thank You Cisco ISR G2 2900 and 3900 Series Routers

Over the past 9 years, the Integrated Services Router (ISR) G2 router portfolio has helped tens of thousands of Enterprise and Service Provider customers build, secure, grow, and transform their businesses. It has been the most successful router product line in the history of branch networking. ...

Saturday, 23 December 2017

Introducing executive dashboards in CTA

No security risk assessment is complete without the executive summary section. Something that can answer the high level questions security teams get asked including “how secure are we?”, “what threats are affecting our network today?” and “how healthy is our network?” We have recently revamped the Cognitive Threat...

Monday, 18 December 2017

Malware stealing gigabytes of your data as seen by Cognitive Threat Analytics

Overview Recently, about 50 users across 20 companies were alarmed by the Cisco Cognitive Threat Analytics (CTA) about a malware that exfiltrates gigabytes of data from their computers. An example of such CTA detection: ...

Friday, 15 December 2017

Cisco & MapR set a Software Defined Storage World Record

66 years in the making! It sounds like a long time, but first we had to wait for a few milestones to precede us: ◈ 1951 – UNIVAC pioneers use of magnetic tape for storage ◈ 1993 – Severe Tire Damage is the first band to live stream...

Wednesday, 13 December 2017

Analyzing Network Traffic with Encrypted Traffic Analytics

Today, knowing who is using your network is table stakes. What’s essential is knowing how the network is being accessed, what applications are being used, when they are used and most importantly, whether or not those applications are safe enough and compliant with your organization’s policies. Independent testing...

Monday, 11 December 2017

Cognitive Research: Learning Detectors of Malicious Network Traffic

Malware is constantly evolving and changing. One way to identify malware is by analyzing the communication that the malware performs on the network. Using machine learning, these traffic patterns can be utilized to identify malicious software. Machine learning faces two obstacles: obtaining a sufficient training set of malicious...

Friday, 8 December 2017

The Race is On: Is Your Network 5G Ready?

The growing 5G momentum promises tremendous commercial opportunities for service providers, with estimates that the global 5G market will be worth US$12.3 trillion by 2035. To pursue these new untapped opportunities, service providers need to ramp up their network capabilities to support future 5G services. As we move...

Wednesday, 6 December 2017

Cognitive Threat Analytics: Turn Your Proxy Into Security Device

Some of us still intuitively believe that our extensively safeguarded corporate networks are safe from the risks we are exposed to when connecting directly to public Internet. Yet, evidence suggests that most companies now operate with significant persistent malware present in the network. At the same time, malware...

Monday, 4 December 2017

CMS Brute Force Attacks Are Still a Threat

Brute force attacks have existed long before the Internet. As a cryptanalytic attack, it started being used as an attempt to access encrypted data when there were no other options available. With the rise of the Internet, this type of attack was quickly adopted. In a nutshell, a...

Friday, 1 December 2017

The Cisco ASR 9000 – Timeless Versatility for Future Growth

Cisco’s Aggregation Service Router 9000 (ASR 9k) has evolved into the cloud-scale, multi-service platform offering unprecedented flexibility, scale, programmability and security for Service Providers today. When the ASR 9k was first announced in November 2008, it was a 6-slot and a 10-slot chassis—each of them capable of handling...

Wednesday, 29 November 2017

Viptela and Cisco Managed Services - Even Better Together

The Software-Defined Networking Movement Cisco has been leading the charge into enterprise software-defined wide area network (SD-WAN) with its industry-leading Intelligent WAN (IWAN) solution. A complementary Meraki-based solution addresses the SD-WAN needs of the smaller enterprise and commercial markets. Regardless of market segment, SD-WAN offers incredibly powerful transport...

Monday, 27 November 2017

Five to Thrive in a Disruptive Environment: Part 2

In my previous blog, I introduced the concept of Five to Thrive. These leadership tips can help you navigate a world of astounding change and mind-boggling opportunities. And, hopefully, avoid the risks and threats hiding around every corner. To learn about the first three—Recognize the Source of Value,...

Saturday, 25 November 2017

5 Reasons Why Customers Swear by Support Services

If you’re on the fence about whether to purchase (or renew) Cisco Support Services, I’ve got a story for you. I recently met with a group of Cisco Account Managers to better understand what customers are looking for in a protection policy. As the team began to whiteboard...

Tuesday, 21 November 2017

Viptela and Cisco Managed Services Even Better Together

The Software-Defined Networking Movement Cisco has been leading the charge into enterprise software-defined wide area network (SD-WAN) with its industry-leading Intelligent WAN (IWAN) solution. A complementary Meraki-based solution addresses the SD-WAN needs of the smaller enterprise and commercial markets. Regardless of market segment, SD-WAN offers incredibly powerful transport...

Friday, 17 November 2017

Cisco Email Security is Top Solution

Billions of corporate messages flow back and forth on a daily basis. And with over 90% of breaches starting with an email, organizations today face a daunting challenge when choosing the best email security solution to stop emails with phishing links or malicious attachments that unleash ransomware, phishing...

Wednesday, 15 November 2017

The Power of Role Models and a Good Book

My path to cybersecurity looks more like a winding road than a straight line, but it’s the influential role models and valuable information I consumed with every turn that paved my path towards a career in cybersecurity – specifically privacy. ...

Tuesday, 14 November 2017

Cisco IT Helps TAC Team in Mexico Get Back Online Fast Following Major Earthquake

Our colleagues in the Mexico City office had a close call on September 19, 2017, when the magnitude 7.1 Central Mexico earthquake struck. They were already outside of their building, ironically, having been evacuated as part of a scheduled earthquake drill. ...

Saturday, 11 November 2017

Cisco Digital Network Architecture – An Overview of the Architecture Tools and Vision

At one of the projects that I’m currently working on, confusion was rising around the terms Cisco DNA, DNA Center and the implementation of Cisco DNA Center. It didn’t take me much effort to clear up the confusion but it does provide the need for an explanation on...

Wednesday, 8 November 2017

Five to Thrive in a Disruptive Environment: Part 1

At last count, Gartner tracks more than 450 IoT platforms in the market. And that’s just today. It’s astounding the number of tools and the amount of technology continuously being invented and reinvented. The impacts and the stakes are extremely high. Nine out of ten companies will experience...

Tuesday, 7 November 2017

Miercom Agrees: Huawei is no Match for Feature-Rich Cisco

A modern-day enterprise Wi-Fi infrastructure has to be multi-faceted. It should be optimized, not only for high performance, but also in order for other areas to maintain a smooth flow of Wireless LAN operations. Enterprise Wi-Fi vendors offer various features to furnish the business requirements of the customers....

Saturday, 4 November 2017

Disruption in Our Learning Cultures Develops Families as Learning Partners

Today, technology is a bullet train rapidly transforming every sector in society. Disruption is evident in companies like Airbnb and Lyft that have completely rearranged how we vacation and commute. This disruption not only shifts what we do, but impacts our mindset, as well. We think differently about...

Thursday, 2 November 2017

Realizing a Multi-Vendor Virtualized RAN

It’s now been over 6 months since Cisco announced that it had joined the Open Air Interface (OAI) software alliance, with the aim of accelerating open, multi-vendor, RAN splits and the first week of November marks a milestone in that co-operation. ...

Wednesday, 1 November 2017

Security as a Strategic Imperative

In the digital era, every company is considered a technology company. Whether you provide electricity, banking or public transportation, you are increasingly dependent upon the internet and network connectively. If all companies are technology companies, that means all companies need to prioritize cybersecurity as a strategic imperative to...

Digital India: Driving the Next Wave of Innovation in Mass Scale Networking

India’s first ever Mobile Congress kicked off in New Delhi last month with the goal of fostering digital inclusion across the country. A number of government ministers, officials, as well as top industry executives from around the world, spoke at the inaugural event. I am writing to you...

Tuesday, 31 October 2017

Miercom Proves: Cisco versus Huawei is No Contest

The three tests I want to focus on are: 1. Multi-Client, Multi-AP RRM Test 2. Voice and Video over Wi-Fi Test 3. Dataplane Encryption Test ...

Sunday, 29 October 2017

Filling the Cybersecurity Professionals Gap – with Women

Due to the high-profile data breaches, cybersecurity has become a household word. Think back to just one month ago, when the data breach at Equifax exposed the personal information for 145.5 million consumers – almost half of all Americans. At Cisco, we know our customers and other business...

Friday, 27 October 2017

Creating Capacity for Innovation

Large organizations have a challenge that start-ups don’t have. They have unintended complexity, duplication, old processes, and work that exists simply because it has always been done that way. Most executives of large organizations know they need to embrace Digital Transformation, but they don’t know where to begin....

Thursday, 26 October 2017

Securing the Campus

From student data and intellectual property, to reputation and grant funding…higher education institutions are at risk if cybersecurity is not a foundational element in their operations. This fall, more than 20 million students returned to their college or university. Each student will walk on campus with at least...

Wednesday, 25 October 2017

Cisco Traffic Analysis & Encrypted Threat Analytics

Today, knowing who is using your network is table stakes. Knowing what users are consuming on the network is essential for analysis. What applications are being used, when they are used and most importantly are those applications are safe enough and compliant with your organization policies. Independent testing...

Tuesday, 24 October 2017

Secure, High Availability for Epic EHR Systems with Cisco ACI and Tetration

Since its initial release, Cisco Application Centric Infrastructure (ACI) has been selected and deployed by many healthcare institutions around the globe.  ACI is the foundation for achieving these customer’s next generation application requirements for their complex environments and applications. ...

Monday, 23 October 2017

Architecting a More Secure Future

The new age of innovation is providing a level of convenience and technological advancements that were once unfathomable. But with every breakthrough comes challenges, and more precisely these days, security challenges. We, in the security industry, are constantly faced with new threats emerging from vectors that didn’t even...

Wednesday, 18 October 2017

Working Wherever: Digital Safety Beyond the Company Walls

Imagine you’re a business traveler at the airport with a little time to spare before your flight. You fire up your laptop, access the airport’s free wi-fi, log on to your bank account, and pay your credit card bill to free up credit for your trip. Efficient use...

Monday, 16 October 2017

The Advantage of Remote PHY

In a recently published white paper, The TCO Advantage of Remote PHY, we compare the CAPEX and OPEX of a Remote PHY deployment with an Integrated CCAP/HFC deployment. A next-generation Distributed Access Architecture (DAA), Remote PHY moves access hardware from the headend to smaller hub sites or into...

Putting the “Why” in Remote PHY

As cable operators continue to look at facing the ever-increasing onslaught of data demand from subscribers, we must ask ourselves, “Is there a better way to do things?” We all have heard the unofficial definition of “insanity” as “doing the same thing over and over and expecting a...

Friday, 13 October 2017

The Time is Now for a More Strategic Approach to Innovation

The ability to consistently and effectively innovate is something many organizations find challenging. While the importance of innovation is widely acknowledged for long-term business health, surprisingly few can legitimately claim to be achieving powerful, repeatable results on a regular basis. This is because innovation, much like any other...

Thursday, 12 October 2017

Introducing a New Era in Branch Routing

Why the ISR 1000 Series is a Really Big Deal. Today Cisco is introducing a new addition to the Integrated Services Router (ISR) portfolio of branch routers. The ISR 1000 Series follows the new sleek design popping up across Cisco platforms, so it looks sexy, but that’s not...

Wednesday, 11 October 2017

“Pitching Packets” Game Teaches Cyber Security with Beanbags

This October, the 14th year of National Cyber Security Awareness Month (NCSAM) focuses on educating consumers on Internet safety.  Consumers can be of all ages and backgrounds, so in the spirit of NCSAM, I’d like to share how beanbags and laundry baskets can be used to teach anyone...

Monday, 9 October 2017

Building the Right Innovation Maturity Model for your Business

We discussed the important role that an innovation maturity model (IMM) plays in creating a strategic, repeatable framework for innovation excellence. In this second installment, we will look at the process of creating an effective IMM, drawing on Cisco’s own IMM as an example. ...

Friday, 6 October 2017

Cisco CCNA Cyber Ops Scholarship: The Ins and Outs!

Cisco had developed a new certification in order to reduce the global cybersecurity skills gap that has been reported throughout various sources. This certification is called the CCNA Cyber Ops and it is along the lines of what a Security Analyst in a Security Operations Center (SOC) does....

Wednesday, 4 October 2017

Refreshed Wireless and Design Certifications Offer Up-to-date Skills for IT Professionals

As the technology landscape continues its rapid transformation, those who work in the industry are faced with the constant challenge of keeping their skills up-to-date. To address the needs of professionals looking to build, assess and continually reinforce wireless technology or network design expertise throughout the spectrum of...

7 Reasons to Zip Over to WebEx

It’s a sentiment even truer today than in his 17th-century writings. We all rely on others for survival. The ability to connect for a quick chat was much simpler in Donne’s era. Or was it? Even if most of your employees are one place, it’s unlikely that all...

Tuesday, 26 September 2017

Cisco Intersight – A Transformative Evolution

Cisco recently introduced Cisco Intersight, a revolutionary cloud-based systems management platform. Intersight was designed to deliver significant benefits while being easy to use and simple for Cisco UCS and HyperFlex customers to transition. ...

End-to-end Security Management for the Next-generation Data Center with Cisco ACI and AlgoSec

Introduction: The heart of the data center, today’s business applications are highly dynamic with connectivity between the various application components that are constantly changing to support business continuity and digital transformation initiatives. This constant state of flux increases the organization’s attack surface and creates gaps in the security...

Friday, 22 September 2017

CCleaner Command and Control Causes Concern

Introduction Talos recently published a technical analysis of a backdoor which was included with version 5.33 of the CCleaner application. During our investigation we were provided an archive containing files that were stored on the C2 server. Initially, we had concerns about the legitimacy of the files. However,...

Wednesday, 20 September 2017

Cisco Security Connector: Built for iOS 11

Apple and Cisco have partnered to help businesses in every industry accelerate their mobile transformation. From seamless user experience with collaborative applications to Wi-Fi optimization, the partnership has been grounded in a tangible reality. ...

Tuesday, 19 September 2017

How to Evolve Media Infrastructure, and Sleep Well at Night

Imagine you’ve made a decision to move out of your house—the one that’s faithfully served your needs in the past years—to a new one. You want your new house to be part of the digital world around you, and to enjoy all the benefits of modern technology, so...

Introducing the First Benchmark Standard for IoT

We have reached a point where virtually every electronic device can be connected to the internet and interact with its surrounding environment. The explosive growth of the Internet of Things shows no signs of slowing down, and in fact, may actually be speeding up. We have already seen...

Saturday, 16 September 2017

Will Driverless Cars Dream in Cisco Hues?

Google, Uber, Ford. They are the big names in driverless vehicles. But did you know Cisco is already empowering nearly every Connected Car on Earth? Through its cloud-based IoT platform, Jasper, Cisco has become a key player in Smart Car technology, helping Honda launch its connected car services...

Thursday, 14 September 2017

Introducing a New Software Subscription for Cisco DNA

Today every business model transformation, every market shift is fueled by software. Software has become the key to innovation. Let’s take an example of your user mobility requirements. Today it serves a purpose beyond just simple connectivity. Customers expect a flawless experience irrespective of where they are, which...

Tuesday, 12 September 2017

Cisco RV340 and RV345 Dual WAN VPN Routers

I thought it would be a good time to provide a quick update on our Cisco RV Series. As amazing as Rafael Nadal is as he took his 10th French Open yesterday at Roland Garros, our new RV340 Series models continue to amaze as they make their way...

New Addition to Cisco SMB Switch Family

We made another big step in completing our full vision of next generation SMB switches. The Cisco Small Business Team is pleased to announce 19 new models in the successful 550X and 350X series switching product line. These new models provide Gigabit or Fast Ethernet with 10-Gigabit uplinks...

Sunday, 10 September 2017

Segment Routing IPv6 – Interoperability demo is already there!

Who would have bet on a SRv6 interoperability demonstration at SIGCOMM 2017 conference this summer? Very few of us actually… For those who are not familiar with the SIGCOMM 2017 conference, this is a highly respected conference where key networking innovations and orientations are being discussed every year...

Friday, 8 September 2017

Prevent an Encryption Bottleneck on High-Speed Links

What if you had a car with a powerful, turbo-charged engine that could fly along at 130 mph —until you turned on the air conditioner and watched the max speed drop to 50? Pick up two friends, and it struggles to maintain 30 mph. This would be depressing...

Wednesday, 6 September 2017

Operators Can Bridge the Gap for New IoT Revenues

The market for Low Power Wide Area (LPWA) networks, particularly NB-IoT and CAT-M1, is heating up. More and more Mobile Network Operators are engaged in trials or have already launched commercial services. Manufacturers are adding NB-IoT and CAT-M1 support to their sensors, modules, and devices. To date, Operators...

Tuesday, 29 August 2017

Stay Connected Wherever You Go with MTX Connect

So how many of you go on a business trip to another country only to find upon your return the shock of a lifetime, your phone bill? I know that I have and instead of the promises of lower prices from the big operators, you get hit with...

Friday, 25 August 2017

Network Slicing in Action

One particular aspect of mobile network evolution that deserves attention is the idea of reducing round-trip time (RTT) between consumers of a service and the service source itself. So much so that in 5G, this concept has acquired its own unique 3GPP term: URLLC which is an acronym...

Cisco Accelerates Cloud Native vDRA and Scoops up Two North America Wins

People today use their mobile devices anytime, any place, and anywhere and According to the Global mobile Suppliers Association (GSA) today there are still more than 800 mobile operators investing in LTE. There are also close to 600 additional LTE networks that have been commercially launched and another...

Wednesday, 23 August 2017

Introducing New Enterprise Controls for Cisco Spark

Making the Impossible, Possible Last year, one of my colleagues went to a start-up conference with 2,000 people. On stage, someone asked the audience how many were working on consumer apps. Almost everyone raised their hands. Then the person asked how many were working on enterprise apps. This...

Tuesday, 22 August 2017

How Your Network Just Became the Smartest Student in the Class

The Network. Intuitive. is a complete transformation in hardware, software, and management that will change how networks operate, enabling them to adapt in real time with artificial intelligence (AI), and delivering the secure foundation for our digital world, faster and more  securely, all while driving down operational cost....

Sunday, 20 August 2017

Service Provider Security Architecture – Part 2

In my earlier blog post, I described the need for pervasive security and architectural approaches to enable secure, agile services against increasingly sophisticated attackers. Pervasive security is critical to the Open Network Architecture (ONA). ...

Saturday, 19 August 2017

Service Provider Security Architecture – Part 1

There has never been a more interesting time to be a Service Provider.  Today, we are in the midst of a once in a generation transition in technology that we last saw with the birth of the internet.  Today, the exponential growth in hyper-connectivity, the services that evolve...

Friday, 18 August 2017

Digital Transformation Taking Flight in ASEAN Region

We showcased our innovation at CommunicAsia in Singapore a week ago, highlighting the changing digital landscape and sharing insights on how companies should be ready for the future. Our senior executives were on hand to address topics and trends impacting organizations across the region, from strategies to migrate...

Friday, 11 August 2017

Cisco’s 3-Phase Plan for your 5G success

It is generally accepted that revenues for mobile service providers are trending flat to down. A recent ARPU report from Informa provides this picture in detail by country. Some mobile service providers have acquired content services as a way to boost this trend, but they admit that this...

Thursday, 10 August 2017

Deep Dive into AMP and Threat Grid integration with Cisco Email Security

In this blog post, we are going to dive deeper and explain the workflows of AMP and Threat Grid integration with Cisco Email Security (applies to both Cloud Email Security and on premise Email Security Appliance), as well as help administrators refine security posture in their organizations. Let’s...

Wednesday, 9 August 2017

Replace your AV with Next Generation Endpoint Security

If you’ve been to a security conference in the last year you’ve probably seen more than 20 different vendors all talking about endpoint security. Some might be talking about next generation anti-virus, endpoint detection and response, and even the much lauded machine learning. How do you cut through...

Tuesday, 8 August 2017

Capturing the Opportunity of Digital Transformation

Information is the fuel for the continuing transformation of healthcare, enabling a care system that can address the growing challenges of quality, equity and cost.  But as health systems and hospitals digitally transform, as they increase their ability to acquire and process clinical information, the question is how...

Sunday, 6 August 2017

Shifting Perceptions in Technology to Drive Change in Learning

The cloud and mobility in our devices have caused industries the world over to rethink how they conduct business. Education is no exception to this shift in culture. How does a public service industry tasked with the education of minors and often an extremely limited budget create access...

Saturday, 5 August 2017

School’s In: Flexible Radio Assignment

If you are in IT, you’re being asked to support more wireless devices – both end user and non-user – as well as the ever growing applications they use. These applications, such as video and collaboration, are far more bandwidth intensive and add large amounts of traffic to...

Wednesday, 2 August 2017

Network Security in the Age of Hyperconnectivity: Pervasive, Proactive, and Persistent Protection is Essential to Thwart Cyberattacks

Securing today’s digital content has become more challenging, as there are more endpoints and wide area networks (WAN) to protect than ever before. There will be 27.1 billion networked devices/connections by 2021, up from 17.1 billion in 2016 globally (according to the latest Cisco Visual Networking Index).  The...

Monday, 31 July 2017

Cisco Command Line Interface CLI

After that, the router will allow us to type commands but in different modes we can only used specific commands. So in this tutorial we will learn about the Command Line Interface (CLI) and different modes in a Cisco router/switch. Below lists popular modes in Cisco switch/router: ...

Saturday, 29 July 2017

Cisco adds new capabilities to its Infinite Broadband solution for Cable Access Networks

It’s hard to believe we’ve been shipping the Cisco RPHY (Remote PHY), standards based, products for two months already! It all started at ANGA.COM with the launch of Infinite Broadband, which included the cBR8 RPHY capability and a GS7000 RPD (Remote PHY Device). ...

Saturday, 22 July 2017

Threats with Escalating Impact: Announcing the Cisco 2017 Midyear Cybersecurity Report

It’s time again for our Midyear Cybersecurity Report (MCR), which offers updates on the security research and insights revealed in the recent Annual Cybersecurity Report. The unsettling news at this halfway point in the year is that the bad actors are adding new and sophisticated spins to their...

Thursday, 20 July 2017

Introducing Cisco CMX Engage

Enhancing customer experience to unlock the Business Value from Wireless Infrastructure Wi-Fi is fast becoming an essential commodity, on par with air, food and water. In response, almost every known modern business across the world is attempting to offer free Wi-Fi to visitors. The next big question is...

Tuesday, 18 July 2017

For Women in Cybersecurity, Possibilities are Endless

When the public thinks of cybersecurity we often envision people sitting in dark rooms writing code and fighting hackers. Although those people exist and are necessary, cybersecurity as a career is much more expansive and is an excellent option for women looking for rewarding opportunities. ...

Saturday, 15 July 2017

Cisco Firepower NGFW Delivers Unparalleled Threat Defense in NSS Labs Testing

Real-World Testing to Inform Your NGFW Buying Decision We’re excited to share with you the latest NSS Labs NGFW test results. In the most rigorous independent NGFW testing to date, Cisco outperformed eight competitors in security effectiveness, blocking 100% of evasions and surpassing four vendors by over 50...

Friday, 14 July 2017

Cisco achieves 100% detection in Breach test

And why 100% detection is grossly misleading It is with great pride that we received the latest Breach Detection Report from NSS Labs, in which Cisco achieved a 100% detection rate – we simply couldn’t be more pleased to have our products so well-represented and validated in the...

Monday, 10 July 2017

What is the Body Language of Your Encrypted Network Traffic Really Saying?

Imagine this scenario – you walk into a meeting room with a colleague and they are sitting at the table with their arms crossed. You immediately think to yourself, this meeting is not going to go well, this person is already displeased with me and I have not...

Friday, 7 July 2017

Cisco Introduces a New Era in Networking, Powered by Software Innovation and Subscription Buying

Introduction of Cisco DNA Advantage and Essentials subscription-based network software will transform how infrastructure software is bought and deployed in the new era of networking. These latest innovations reinforce Cisco’s commitment to transition its business to a software-centric, subscription-based model, while helping accelerate our customers’ digital transformation. ...

Monday, 3 July 2017

Cisco Kinetic Unlocks the Power of Your IoT Data

In recent years, companies across the globe have embraced the idea of a hyper-connected, digital world. Now I’m starting to see a level of maturity within those companies, an understanding that they need to move beyond the test-and-learn phase to truly master IoT as a way to drive...

Wednesday, 21 June 2017

Announcing a new era of networking: Cisco DNA for Healthcare

The Network. Intuitive Introducing an entirely new era of networking — constantly learning, constantly adapting, constantly protecting.  Cisco Digital Network Architecture (DNA) foundation enables digital transformation for healthcare. Its software-driven service that delivers faster innovation with actionable insights, lowers costs with network automation, and reduces risks with security...

Saturday, 17 June 2017

Cisco Hyperflex: The Time for HCI Compromise is Over

Hyperconverged infrastructure (HCI) – it’s a bit of a mouthful but the truth is it’s not half as complicated as it sounds. While the concept has only been mainstream for a few years, HCI is the fastest-growing segment of the market for integrated systems. In fact, Gartner predicts...

Thursday, 15 June 2017

Cisco Small Business Update: New Wireless and Routers models announced!

The new the Cisco WAP125 Wireless-AC Dual Band Desktop Access Point with PoE is an entry-level, business-class desktop access point offering cost-effective 802.11ac connectivity for 2.4-GHz and 5-GHz clients. Delivering speeds up to 867 Mbps, this model has a single Power-over-Ethernet (PoE) Gigabit Ethernet port. The WAP125 is...

Thursday, 8 June 2017

Miercom Report: Secured Network Infrastructure

Everyday networks are being hammered with multiple types of threats, coming from a variety of sources. To make matters worse, these threats often use sophisticated techniques to be undetected by traditional security methods. Proliferation of IoT devices increase these risks as most IoT devices often use non-standard protocols,...

Friday, 2 June 2017

Transformation and the New Role of Managed Services

If you are a part of or even peripherally connected to an IT organization or managed services provider, you probably hear the word “transformation” daily, perhaps even more frequently.  Like other well-worn terms such as “Digitization,” “DevOps,” or “Agile,” transformation can mean a lot of different things depending...

Thursday, 1 June 2017

Cisco Enterprise Agreement for Digital Transformation

We are excited to announce the completely refreshed Cisco Enterprise Agreement (EA), passionately built from scratch for our customers. Customers are telling us they want a simpler way to consume technology. They need to easily manage software, respond to consistent changes, and get the most value from their...

Monday, 29 May 2017

How is Cisco Digitally Transforming its Support?

Customers are now demanding much more from support services, and that is leading to a change in the support landscape. Customers want unified interactions using voice, video and email that helps to increase efficiency. They are looking for near time issue resolution to reduce costs, and they want...

Sunday, 28 May 2017

The 5 Critical Components of a Secure Store

We discussed how the Cisco SAFE methodology can help you to implement a reliable security solution for your store. This approach can help you define and address each threat to the retail branch with corresponding security capabilities, architectures, and designs – guiding you to a complete security solution...

Tuesday, 16 May 2017

The Innovation Funding Board Process in Action

I shared the key components needed for an Innovation Funding Board (IFB) to function effectively, including the importance of establishing what success will look like at the outset. Now, I’ll break down the innovation process itself—and the key stages needed to take a great idea from initial inception...

Friday, 5 May 2017

Managing the Complexities of Multicloud

Many of you are already working in multicloud environments – a combination of public and private clouds (i.e., AWS, Azure, Google, and on-premise IT). In fact, IDC found that 84% of IT executives surveyed expect to use multiple clouds from multiple cloud providers. Organizations are pursuing multicloud for...

Monday, 1 May 2017

Cisco ACI and Fortinet Joint Solution Enables Business Agility at Axians AB

Introduction:  I am covering a customer success story featuring the Cisco ACI and Fortinet joint solution. Axians AB is a leading Swedish IT sourcing company, with multiple offices in the Nordics and employees across the globe. Axians offers hybrid IT services from datacenters and the public cloud to...

Lessons from Hannover Messe: 5 Ways to Leverage IT for Your Industrial Ops

Our customers are already connecting thousands of intelligent devices and demanding new transparency from their vendors: They want to liberate plant floor data from operational silos and proprietary technologies. Only by doing this will they be able to adapt to the latest advances in automation, sensor technology, and...

Monday, 24 April 2017

Introducing PnP Connect

What is Cisco Network Plug & Play? Cisco Network Plug & Play (PnP) is a secure and scalable solution for simple day-zero provisioning across all Cisco Enterprise platforms (routers, switches and wireless access points). The PnP application runs on top of Cisco Enterprise SDN Controller – APIC-EM. ...

Sunday, 23 April 2017

VGA Cables and WiFi Access as Cloud Adoption Predictors

I spend most of my time educating channel partners, most of them Value-Added Resellers (VARs) on how Cisco CloudCenter can help them help their customers with a hybrid cloud strategy.  What I’ve noticed in my first year at Cisco after being part of the CliQr acquisition is that...

Wednesday, 19 April 2017

Cisco SD-WAN Networking Service for Public Clouds

Enterprises across all verticals are migrating their applications to public cloud (IaaS) services and taking advantage of the great cost savings on compute hosting. But the cost benefits shouldn’t affect security, scalability or customer experience. Enterprises require the same level of secure network access, control and visibility in...

Saturday, 8 April 2017

Ten Technologies to Consider for Contact Centers in 2017: Part 2

Hybrid Services – Integrating cloud services with existing on-premises customer care services is currently a hot topic, not just in the contact center domain but throughout Unified Collaboration and other IT groups.   Hybrid Services architectures allow our Cisco IT teams to deploy some of the latest cloud...

Thursday, 6 April 2017

Protecting Innovation: Update on ITC Enforcement Action

Opening statements for the ITC ‘944 investigation enforcement hearing began this afternoon, and the full evidentiary hearing should be complete tomorrow. In the ITC’s final decision last summer, Arista was found to infringe three Cisco patents, including our SysDB patent. While Arista claims to have redesigned its products...

Sunday, 26 March 2017

Ten Technologies to Consider for Contact Centers in 2017

The line made famous by the Rolling Stones, “Time waits for no one”, is especially true for technology. A little over two years ago I wrote a blog titled “Ten Things to Consider for a Better Contact Center”. While all of the items mentioned are still relevant, the...

Thursday, 9 March 2017

Cisco Distribution Sales Visibility: Another Step toward Ease of Doing Business

Last year, Cisco launched Distribution Sales Visibility (DSV) and began deploying it, country by country, across our distribution channel. Distis in Canada and the US are all now using DSV. A Step toward EoDB The whole point of DSV is to make Cisco easier to work with for...

Pages (26)1234567 »