BYOD
The Cisco IT Story: ITaaS with Cisco Prime Service Catalog
We had some exciting sessions featuring Cisco Prime Service Catalog at Cisco Live Milan a few weeks ago. In case you missed it, we featured two great customer case studies. One of them was Steria, a multinational service provider headquartered in France who has deployed Cisco Prime Service Catalog a…
CHAOS (Control Havoc and Overhaul Security): The new Order for IT
Mobility and the cloud have changed how we work, transforming pockets of downtime into bursts of productivity, with easy access to our most valued information and people. But this transformation has unleashed havoc. Security practices built on decades-old assumptions of placing controls at key point…
Can You Guess Your ROI on Your Secure Access?
No need to guess now! Cisco commissioned Forrester Consulting to examine the business value and potential return on investment (ROI) enterprises may realize by implementing Cisco Identity Services Engine (ISE)—a leading secure access solution. This is available in the recently published Forrester TE…
Don’t Miss: [Webinar] Preparing K-12 Networks for Common Core Feb 5
If you’ve worked on a K-12 wireless network, you’ll know that one of the main customer careabouts is adapting to Common Core Standards. Online testing and BYOD places even higher demands on a high quality, high performing network. What exactly needs to be taken into consideration when de…
User Behavior and Training Critical to Secure Mobility
Worker mobility has become an essential practice for government agencies. From teleworking on the road to accessing critical data on your smart phone, mobility increases productivity and employee satisfaction. And the trend toward mobility is growing. In fact, the Cisco Visual Networking Index predi…
Taking Complexity Out of Network Security – Simplifying Firewall Rules with TrustSec
Bruce Schneier, the security technologist and author famously said, “Complexity is the worst enemy of security.” We have been working with some customers who agree strongly with this sentiment because they have been struggling with increasing complexity in their access control lists and firewall rul…
Summary: Crossing the bridge – Five cloud services you should pay attention to
A number of key applications consumed by businesses through premise-based deployments are now available from the cloud. Irrespective of where you are in the evolution to the cloud, here are five services that are worth your attention. Read my full article for a closer look!…
Is Your K-12 Network Ready for Common Core Standards?
What do IT and K12 Common Core Standards have in common? Forty-five states, the District of Columbia, four territories, and the Department of Defense Education Activity have adopted the Common Core State Standards. 100% of each of these states’ schools must update their network infrastructure to sup…
Security Realities of IoT (Internet of Things)
Are you a security professional or IT professional just resolving the security issues with BYOD (bring-your-own-device)? Watch out, BYOD was a precursor or warm up exercise to the tsunami just hitting your shores now. The SANS Institute just completed a survey on the security viewpoints on IoT, pred…