secure

July 18, 2014

NETWORKING

Third Time’s A Charm: Cisco is a Leader in the Gartner Magic Quadrant for Wired and Wireless LAN Access Infrastruc …

Gartner has released their 2014 Magic Quadrant for Wired and Wireless LAN Infrastructure.  For the 3rd year in a row, Cisco is recognized as a leader in both vision and execution.  We believe this Gartner recognition is validation of Cisco strategy and investments for unified access, policy manageme…

May 29, 2014

NETWORKING

Empower Your Employees with a #MobileWorkspace

[Webinar] Mobilize Your Employees with Cisco Solutions for a Mobile Workspace We discussed the considerations behind the Cisco-Citrix Mobile Workspace solution to set the stage for the CVD (design guide available now!) earlier this month, and now we’ve planned a great technical deep-dive for c…

May 6, 2014

NETWORKING

Setting the Stage for the Cisco Mobile Workspace Solution with Citrix CVD

The times keep changing: first there were devices, then there were apps, and today, if you don’t develop a strategy for enterprise mobility and get ahead of the trend, the mobile wave will leave you behind. A year ago, after talking with many of our customers, partners, and our own technical sales t…

May 5, 2014

NETWORKING

Portland State University rolls out 802.11n and 5760 Series Controller

Portland State University is Oregon’s largest and most diverse public university encompassing 50 city blocks, eight schools, 226 degree programs, 29,000 students, including 1,700 international students from 91 countries, and 126,000 alumni. For the second year in a row, the US News & World Repor…

February 24, 2014

NETWORKING

Going Mobile? Get Secure.

There is no turning back from the mobile trend. With more devices comes the insatiable hunger for bandwidth. After devices are connected to the network, IT must make sure each is secured and provisioned. Creativity is needed to handle these high-density environments and enforce proper policies for m…

December 4, 2013

NETWORKING

Thinking Outside of the Building

You’ve all heard the saying “think outside the box” when encouraging someone to be creative and come up with new ideas, new ways to do things, new ways to…..just about anything.  Well, I’d like to take a small twist on the well-known saying and talk for a moment on how deploying outdoor Wi-Fi access…

May 12, 2013

NETWORKING

Have You Registered for Centralize Policy, Control and Enforcement May 15th?

Activate the IT Transformation with Unified Access: Part 4 –  Centralized Policy, Control, and Enforcement  Wednesday, May 15, 2013  10am-11am PDT     |       Register Now Don’t miss the next in line of our five-part Unified Access Webinar Series  on May 15th to hear how organizations in…

April 10, 2013

NETWORKING

Compliance versus Security

Rogue access points and unauthorized access, DDoS or penetration attacks, evil twin attacks – all mobile security issues that can keep you awake at night. But do you know the difference between compliance and enterprise security? Being compliant is not synonymous with being secure, that’s why our we…