Cisco Blogs / Gordon Thomson
Gordon Thomson
Vice President
Global Enterprise Networking Sales
Gordon Thomson leads Global Sales for Enterprise Networking. His team drives the sales motions for transforming the customer experience through Cisco’s core portfolio, which represents 40 percent of Cisco’s total product revenue. Thomson and his global team work closely with customers and partners, leading them through major market transitions to ensure their businesses thrive and grow. He is passionate about delivering value beyond connectivity through intent-based networking and software selling.
A 22-year Cisco veteran, he develops and implements innovative go-to-market models that accelerate the shift to software selling and digital transformation, delivering revenue and building strong teams with long-term tenures. By combining his technological expertise and customer-first mindset, Thomson has achieved unrivaled success in designing sales strategies for the new software- and cloud-centered markets.
Thomson’s legacy will be his belief in the power of people and teams to achieve powerful results through go-to-market innovation and high-trust relationships with customers.
Articles
Change: When, Not If
“Change” is a beautiful word. It’s so beautiful, in fact, it’s practically all some people in my line of business talk about. Technology is driving change into organizations at a pace no one thought possible just a few years ago. And if your business isn’t busy transfor…
Together Wi-Fi 6 and 5G Will Bring a Huge Wave of Innovation
The rollout of better connectivity with 5G and Wi-Fi 6 is a once-in-a-generation gamechanger and I predict an explosion of innovation as a result. We’ve seen it before; when connectivity improves there is an accompanying wave of new products, services and experiences in all of the adjacent industrie…
A Holistic Approach to Secure Enterprise Mobility
“It’s not secure enough… so we are not going to allow it to happen.”
Does this phrase seem all too familiar?
Today, IT and business leaders are faced with the challenge of securing any user from any location on any device with access to any information. At times, it can be a daunti…
11