BYOD

February 19, 2014

DATA CENTER

The Cisco IT Story: ITaaS with Cisco Prime Service Catalog

We had some exciting sessions featuring Cisco Prime Service Catalog at Cisco Live Milan a few weeks ago. In case you missed it, we featured two great customer case studies. One of them was Steria, a multinational service provider headquartered in France who has deployed Cisco Prime Service Catalog a…

February 13, 2014

DATA CENTER

CHAOS (Control Havoc and Overhaul Security): The new Order for IT

Mobility and the cloud have changed how we work, transforming pockets of downtime into bursts of productivity, with easy access to our most valued information and people. But this transformation has unleashed havoc. Security practices built on decades-old assumptions of placing controls at key point…

February 5, 2014

SECURITY

Can You Guess Your ROI on Your Secure Access?

No need to guess now! Cisco commissioned Forrester Consulting to examine the business value and potential return on investment (ROI) enterprises may realize by implementing Cisco Identity Services Engine (ISE)—a leading secure access solution. This is available in the recently published Forrester TE…

February 4, 2014

NETWORKING

Don’t Miss: [Webinar] Preparing K-12 Networks for Common Core Feb 5

If you’ve worked on a K-12 wireless network, you’ll know that one of the main customer careabouts is adapting to Common Core Standards. Online testing and BYOD places even higher demands on a high quality, high performing network. What exactly needs to be taken into consideration when de…

February 4, 2014

GOVERNMENT

User Behavior and Training Critical to Secure Mobility

Worker mobility has become an essential practice for government agencies. From teleworking on the road to accessing critical data on your smart phone, mobility increases productivity and employee satisfaction. And the trend toward mobility is growing. In fact, the Cisco Visual Networking Index predi…

February 3, 2014

SECURITY

Taking Complexity Out of Network Security – Simplifying Firewall Rules with TrustSec

Bruce Schneier, the security technologist and author famously said, “Complexity is the worst enemy of security.” We have been working with some customers who agree strongly with this sentiment because they have been struggling with increasing complexity in their access control lists and firewall rul…

January 30, 2014

PERSPECTIVES

Summary: Crossing the bridge – Five cloud services you should pay attention to

A number of key applications consumed by businesses through premise-based deployments are now available from the cloud. Irrespective of where you are in the evolution to the cloud, here are five services that are worth your attention. Read my full article for a closer look!…

January 30, 2014

NETWORKING

Is Your K-12 Network Ready for Common Core Standards?

What do IT and K12 Common Core Standards have in common? Forty-five states, the District of Columbia, four territories, and the Department of Defense Education Activity have adopted the Common Core State Standards. 100% of each of these states’ schools must update their network infrastructure to sup…

January 23, 2014

SECURITY

Security Realities of IoT (Internet of Things)

Are you a security professional or IT professional just resolving the security issues with BYOD (bring-your-own-device)? Watch out, BYOD was a precursor or warm up exercise to the tsunami just hitting your shores now. The SANS Institute just completed a survey on the security viewpoints on IoT, pred…