Cisco Invests In Unified Access To Address Fundamental Changes In Enterprise Networking And BYOD

Visit the Link

January 29th, 2013

Cisco is fundamentally changing the way it approaches network  by prioritizing R&D to deliver a common user experience independent upon wired, wireless or remote access. In addition, to simplifying network operations and reducing opex, Cisco is unifying its product suites for One Policy, One Management and One Network to address the BYOD megatrend.  Its approach is to deliver a unified access or holistic solution to IT business leaders that span both wired, wireless and remote network access with a common security,  management and features framework. Cisco calls this new approach Cisco Unified Access. Cisco is also introducing a new converged wired and wireless switch –  Catalyst 3850 switch.   Jeff Reed; Vice President and General Manager Unified Access Group at Cisco Systems joins me to discuss Cisco’s  Unified Access strategy and new Catalyst 3850 switch.

Duration: 15:26 minutes

Lippis Intro/Analysis @ : 00:03 sec

Question 1 @ 2:22: First would you like to add to my intro, that is what is Unified Access and what’s driving it?

Question 2 @ 3:02: What are the basic elements of UA from a product development point of view, that is where is Cisco investing to deliver UA?

Question 3 @ 5:07: Can you expand on the new 3850 product especially around the topic of virtualized WLAN controllers.

Question 4 @ 7:08: How does UA address BYOD, Video and security trends?

Question 5 @ 10:52: How much does IOS 15.0 Infrastructure play a part in UA?

Question 6 @ 12:47: What do you expect the business outcomes to be for those that deploy UA?

Closing @ 14:41: Summary of UA and its impact on business process.

 

Lippis Report 194: One Network, One Company, Cisco Systems

June 12th, 2012

Cisco is fundamentally changing the way it approaches network access by prioritizing research and development to deliver a common user experience independent upon wired, wireless or remote access. In addition, to simplify network operations and reduce opex, Cisco is unifying its product management suites plus centralizing policy definition for network access. Its approach is to deliver a unified access or holistic solution to IT business leaders that span both wired, wireless and remote network access with a common security and management framework. Cisco calls this new approach Cisco Unified Access.

Read the rest of this entry »

Cisco Catalyst SmartOperations Solutions Guide

Get the White Paper

May 29th, 2012

By Cisco Systems

Lower TCO by Activating Embedded Switch Tools that Automate Lifecycle Management Operations

Cisco® Catalyst® SmartOperations is a comprehensive toolkit of network services built into the foundation of Cisco Catalyst LAN switches. These embedded capabilities simplify and automate switch lifecycle management tasks and the QoS policy enforcement that real-time voice and video network traffic requires. There are about a dozen of these network service features, which together form the Cisco Catalyst SmartOperations Toolkit (“SmartOperations”), and they ship on Cisco Catalyst platforms running LAN Base or higher software. Cisco Catalyst SmartOperations tools lower total cost of ownership (TCO) by simplifying and automating network planning, deployment, monitoring, and troubleshooting.

The Total Economic Impact™ of Cisco Catalyst AccessSwitches

Get the White Paper

May 29th, 2012

By Norman Forbush, Forrester Research

Cisco commissioned Forrester Consulting to examine the total economic impact and potential return on investment (ROI) enterprises may realize by deploying Cisco Catalyst Access Switches. For this study, Forrester conducted interviews with five existing Cisco customers and completed an online market survey of 104 senior network managers. The analysis showed that operating expense (opex) contributed up to 70% of total cost of ownership (TCO) and found that TCO is 14% less when IT deploys Cisco Catalyst Access Switches versus others.

Cisco Catalyst Access Switches Lower TCO by 14% According To Forrester

Listen to the Podcast

May 28th, 2012

Cisco commissioned Forrester Consulting to examine the total economic impact and potential return on investment (ROI) enterprises may realize by deploying Cisco Catalyst Access Switches. They found that corporations that deployed Cisco Catalyst Access switches were better off by 14% than if they had deployed other Ethernet switches. They also found that IT executives who deploy non Cisco Ethernet switches spend twice as much of TCO on operational cost. I talk with Pradeep Parmar, Switching Marketing Manager at Cisco Systems on life cycle cost of network ownership and how Cisco’s Catalyst Access Switches deliver lower operational cost.

STP MiTM Attack and L2 Mitigation Techniques on the Cisco Catalyst 6500

Get the White Paper

July 27th, 2010

By Cisco Systems

Spanning-Tree Protocol (STP) can be easily compromised by eavesdropping in a switched corporate environment, but this vulnerability can be mitigated using L2 security features that are available on the Cisco® Catalyst® 6500. STP Man in The Middle (MiTM) attack compromises the STP “Root Bridge” election process and allows a hacker to use their PC to masquerade as a “Root Bridge,” thus controlling the flow of L2 traffic. To understand the attack, the reader must have a basic understanding of the “Root Bridge” Election process and the initial STP operations that build the loop free topology. This paper provides an overview of the STP Root Bridge Election Process, STP MiTM Attack Guide and Mitigation Techniques for STP attacks.

Find out how by downloading this white paper

Lippis Report 145: Cisco Expands TrustSec for 802.1x Access Control, Policy, Identity and Encryption

April 5th, 2010

nicklippis.jpgMany IT leaders are striving to understand who is on their network and what they are doing. These are two simple questions and yet, in many cases, IT business leaders do not have a good way to answer them. And once IT leaders are able to obtain this information the question then becomes what else I can do with the data: obtain a history report, perform statistics for analysis and planning, generate compliance reports and much more. To tightly link business processes with networked applications, IT leaders need to wrap policy, identity and security around users and IT assets.

Read the rest of this entry »

Cisco Launches New X & S Series Edge Switches

Listen to the Podcast

March 17th, 2010

bernadevrimIn addition to desktop connectivity wiring closet switches now connect wireless access points, laptops, kiosks, netbooks, IP phones, printers, video desktop systems and more while also managing electrical power of the devices they connect. New PoE Plus standard 802.3at allow 30W per port to be delivered which has driven a change in wiring closet power management. I talk with Berna Devrim, Sr. Manager, Access Switching Marketing at Cisco Systems about the dynamics forcing a change in wiring closet switching and the new Cisco X and S series of edge switching products which represent progressive thinking in this space. Enjoy, Nick.

Cisco TrustSec

Get the White Paper

March 17th, 2010

By Cisco Systems

The traditional network and physical perimeter is no longer the only borderline to defend information security. Collaboration, IT consumerization, mobility, and new computing technologies are driving productivity gains while presenting renewed security requirements. There is greater pressure on IT to meet the demands of a dynamic workforce, both in terms of service delivery and security challenges. New solutions are needed to protect borderless networks and to help further improve business efficiencies in the mean time. Cisco® TrustSec is such a solution.

To find out how to protect your network with TrustSec download this white paper now

TrustSec Architecture Expands To Incorporate 802.1x & NAC

Listen to the Podcast

March 17th, 2010

StevenSong-photoCisco’s TrustSec is architecture with its implementation spread across client software, infrastructure (Catalyst & Nexus) and policy (Access Control System and NAC appliance). Cisco has expanded TrustSec to incorporate 802.1x clients allowing IT leaders to mix and match NAC and 802.1x endpoints. TrustSec organizes and simplifies authentication and policy schema allowing administrators to configure and maintain identity-based access to IT resources while identifying and applying policy based on a user roles in the organization. TrustSec also provides encrypted links at the switch port level. Steven Song Security Business Manager in the Network Systems & Security group at Cisco Systems joins me to discuss TrustSec and how Cisco is expanding its services and importance for IT business leaders.