Articles
Cisco Catalyst Instant Access Dramatically Simplifies Your Network
There are a lot of great technologies that have outstanding business benefits but are not widely deployed. For example, 802.1X for wired networks can determine appropriate network access based on user identity and additional contextual information. The technology is already built into the network to…
Get Ready for a Deep Dive into Converged Wired and Wireless Access
“Activate the IT Transformation with Cisco Unified Access” Webinar Series: Part II Network Deep Dive, April 17 Your network is going through rapid changes as your user and business requirements continue to evolve. Before long (if it’s not already happening), the edge of your network will more than l…
Deep Dive into Converged Wired and Wireless Access April 17
Last week we kicked off the first webinar of a new 5-part Cisco Unified Access webinar series. Many of you joined the event and I was very happy to see your questions and discussions during the broadcast. The event was a high level overview of industry challenges with BYOD, mobility and the Internet…
Cisco Unified Access Reaches a Major Milestone in London
The headline at Cisco Live London this year is undoubtedly the major advancement of Cisco Unified AccessTM. Thousands of attendees witnessed the introduction of new Unified Access products that simplify network design by converging wired and wireless networks. It’s been a long journey to London and…
One Network for the BYOD Challenge
In my previous posts, I discussed with you the importance of unified policy and management as you respond to the bring-your-own-device (BYOD) trend. The Cisco Unified Access solution brings “One Policy. One Management. One Network” to help you with your BYOD initiatives. Today I’ll take a look at th…
One Management for the BYOD Challenge
As part of my work at Cisco, I get to talk to customers very often. Through these conversations, I learn what works for them and what concerns them. Lately, I’ve been hearing a common theme from a lot of customers: in many organizations IT staff is small and not growing while they are being asked to…
One Policy for the BYOD Challenge
Several years ago, I had a conversation with an IT manager about his company’s network security that I still remember today. He said: “We’re losing our battle over internal network security. We cannot keep up with our vendors and contractors who bring in all kinds of devices to our network. We may t…