Thursday, 8 June 2017

Miercom Report: Secured Network Infrastructure

Everyday networks are being hammered with multiple types of threats, coming from a variety of sources. To make matters worse, these threats often use sophisticated techniques to be undetected by traditional security methods. Proliferation of IoT devices increase these risks as most IoT devices often use non-standard protocols, non-standard stacks and limited or no support for supplicants.

Friday, 2 June 2017

Transformation and the New Role of Managed Services

If you are a part of or even peripherally connected to an IT organization or managed services provider, you probably hear the word “transformation” daily, perhaps even more frequently.  Like other well-worn terms such as “Digitization,” “DevOps,” or “Agile,” transformation can mean a lot of different things depending on the specific organization, the team, or the individual person saying it or hearing it.  It’s a word that’s used so often that it can sometimes confuse rather than clarify discussions.  While not quite there yet, transformation threatens to enter the pantheon of over-used and “buzzy” corporate-speak that serves only as filler content to obfuscate specificity.

Thursday, 1 June 2017

Cisco Enterprise Agreement for Digital Transformation

We are excited to announce the completely refreshed Cisco Enterprise Agreement (EA), passionately built from scratch for our customers.

Customers are telling us they want a simpler way to consume technology. They need to easily manage software, respond to consistent changes, and get the most value from their investment. For these reasons, we are introducing the Cisco Enterprise Agreement. Nothing like this has ever been done before at Cisco.

Monday, 29 May 2017

How is Cisco Digitally Transforming its Support?

Customers are now demanding much more from support services, and that is leading to a change in the support landscape. Customers want unified interactions using voice, video and email that helps to increase efficiency. They are looking for near time issue resolution to reduce costs, and they want to proactively detect and mitigate issues to minimize risk.

Cisco is transforming its support services to provide better customer satisfaction by making it connected, collaborative, and cognitive.

Sunday, 28 May 2017

The 5 Critical Components of a Secure Store

We discussed how the Cisco SAFE methodology can help you to implement a reliable security solution for your store. This approach can help you define and address each threat to the retail branch with corresponding security capabilities, architectures, and designs – guiding you to a complete security solution against everything from worms to ransomware attacks.

Tuesday, 16 May 2017

The Innovation Funding Board Process in Action

I shared the key components needed for an Innovation Funding Board (IFB) to function effectively, including the importance of establishing what success will look like at the outset. Now, I’ll break down the innovation process itself—and the key stages needed to take a great idea from initial inception through to full implementation.

There are many ways that the innovation process can be approached, depending on the ultimate goals of those involved. The method described in this blog uses a build/test/learn approach to encourage a lean startup mentality amongst project teams. There are four main phases involved: Ideas; Rapid Evaluation; Incubation; and, finally, if a project is successful, Implementation.

Friday, 5 May 2017

Managing the Complexities of Multicloud

Many of you are already working in multicloud environments – a combination of public and private clouds (i.e., AWS, Azure, Google, and on-premise IT). In fact, IDC found that 84% of IT executives surveyed expect to use multiple clouds from multiple cloud providers. Organizations are pursuing multicloud for a variety of reasons including increasing revenue, reducing costs, decreasing time to market, or simplifying IT infrastructure. While a mulitcloud approach can deliver tremendous benefits, it can also create complexity, exposing a gap between the business need for digitization and what IT can reliably and confidently support.