Wednesday 17 January 2018

On-Premises or Cloud Video Conferencing? How About Both?

Traditionally, the video conferencing market has been very firmly divided into premises-based products and cloud-based products. Premises-based products still dominate, though there is significant growth in cloud-based solutions. With premises products, IT departments deploy servers that they own and operate. Those servers provide the bridging, mixing, and switching functions for voice, video, and content share that make the meeting happen. With cloud-based solutions, a similar server exists – but – it’s in the cloud, of course, and it’s owned and operated by the SaaS vendor.

Monday 15 January 2018

Hyperconvergence doesn’t get any easier

When it comes to managing hyperconverged infrastructure, simplicity is the key. Unfortunately, for many solutions the underlying infrastructure is inflexible and complex and so is cluster management. We designed Cisco HyperFlex Connect with three goals: to make it super easy to use; unify the management so you don’t have to switch between platforms to mange multiple clusters; and to make the interface smart and intuitive.

Friday 12 January 2018

Why Digital Success Depends on the Right Network

Many of us often gravitate to the “bargain”.  We’re intrigued by one-day only deals.  However, when it comes to long-term purchases, we’re typically guided by quality, brand, and safety.  We don’t want to “go cheap” when building a house or buying a car.  We recognize the importance of a strong foundation and company name.  It’s the same with our networks. Making networking choices based on what initially appears cheapest inevitably leads to undesirable outcomes. And this is particularly important in today’s digital era.

Thursday 11 January 2018

Bridging the gap between IT and Business through Big Data Analytics

The role of IT and networking specifically as we know it, is changing in the eyes of many Cisco stakeholders, primarily: (1) IT Experts and (2) Business Leaders. This combined with the changing expectations of the millennial generation will have a huge impact on the next market transition. Simplistically, network’s power to influence business outcomes cannot be underestimated. By combining network data with secondary sources of business critical information: cost, service management, user and compliance data and device diagnostics, companies like Cisco can empower businesses to optimize operations, profitability and decision-making. Concisely, using telemetry we can improve the productivity at any level of the organization.

Tuesday 9 January 2018

Meltdown proves that the industry needs a better answer for protecting cloud content

Security researchers announced this week that they had discovered a significant vulnerability in almost every computer on the planet. This vulnerability – actually two related ones called Meltdown and Spectre – allow a malicious application running on a computer to peek into the memory of another application on the same computer and suck out its contents. This is most devastating in public cloud environments where applications from different customers often end up running on the same physical computer.

Friday 5 January 2018

It’s time to move away from SNMP and CLI and use Model-Driven Telemetry

Traditional features such as SNMP, CLI, and Syslog, used for collecting operational statistics from a network, have several restrictions due to the growth of the objects like IoT devices and cloud based applications.

Thursday 4 January 2018

Defending Against The $5B Cybersecurity Threat – Business Email Compromise

If an average employee at your company got an email from an executive with an urgent request, would they question whether the email was coming from the actual sender? They probably wouldn’t. The reality is that most people would act on the request because of its time-sensitive nature. They assume that the IT team has the right technology in place to validate email senders so they can focus on doing their work. But this is why attackers succeed. Their target thinks the email is coming from someone they trust and consequently, their organization gets breached. This type of attack is called Business Email Compromise (BEC), email spoofing or spoof abuse. The FBI estimates it has cost companies $5.3B globally – far more than the $1B in 2016 for ransomware.