Visit the Link
January 29th, 2013
Cisco is fundamentally changing the way it approaches network by prioritizing R&D to deliver a common user experience independent upon wired, wireless or remote access. In addition, to simplifying network operations and reducing opex, Cisco is unifying its product suites for One Policy, One Management and One Network to address the BYOD megatrend. Its approach is to deliver a unified access or holistic solution to IT business leaders that span both wired, wireless and remote network access with a common security, management and features framework. Cisco calls this new approach Cisco Unified Access. Cisco is also introducing a new converged wired and wireless switch – Catalyst 3850 switch. Jeff Reed; Vice President and General Manager Unified Access Group at Cisco Systems joins me to discuss Cisco’s Unified Access strategy and new Catalyst 3850 switch.
Duration: 15:26 minutes
Lippis Intro/Analysis @ : 00:03 sec
Question 1 @ 2:22: First would you like to add to my intro, that is what is Unified Access and what’s driving it?
Question 2 @ 3:02: What are the basic elements of UA from a product development point of view, that is where is Cisco investing to deliver UA?
Question 3 @ 5:07: Can you expand on the new 3850 product especially around the topic of virtualized WLAN controllers.
Question 4 @ 7:08: How does UA address BYOD, Video and security trends?
Question 5 @ 10:52: How much does IOS 15.0 Infrastructure play a part in UA?
Question 6 @ 12:47: What do you expect the business outcomes to be for those that deploy UA?
Closing @ 14:41: Summary of UA and its impact on business process.
Listen to the Podcast
May 28th, 2012
Cisco commissioned Forrester Consulting to examine the total economic impact and potential return on investment (ROI) enterprises may realize by deploying Cisco Catalyst Access Switches. They found that corporations that deployed Cisco Catalyst Access switches were better off by 14% than if they had deployed other Ethernet switches. They also found that IT executives who deploy non Cisco Ethernet switches spend twice as much of TCO on operational cost. I talk with Pradeep Parmar, Switching Marketing Manager at Cisco Systems on life cycle cost of network ownership and how Cisco’s Catalyst Access Switches deliver lower operational cost.
April 5th, 2010
Many IT leaders are striving to understand who is on their network and what they are doing. These are two simple questions and yet, in many cases, IT business leaders do not have a good way to answer them. And once IT leaders are able to obtain this information the question then becomes what else I can do with the data: obtain a history report, perform statistics for analysis and planning, generate compliance reports and much more. To tightly link business processes with networked applications, IT leaders need to wrap policy, identity and security around users and IT assets.
Read the rest of this entry »
Get the White Paper
March 17th, 2010
By Cisco Systems
The traditional network and physical perimeter is no longer the only borderline to defend information security. Collaboration, IT consumerization, mobility, and new computing technologies are driving productivity gains while presenting renewed security requirements. There is greater pressure on IT to meet the demands of a dynamic workforce, both in terms of service delivery and security challenges. New solutions are needed to protect borderless networks and to help further improve business efficiencies in the mean time. Cisco® TrustSec is such a solution.
To find out how to protect your network with TrustSec download this white paper now
Listen to the Podcast
March 17th, 2010
Cisco’s TrustSec is architecture with its implementation spread across client software, infrastructure (Catalyst & Nexus) and policy (Access Control System and NAC appliance). Cisco has expanded TrustSec to incorporate 802.1x clients allowing IT leaders to mix and match NAC and 802.1x endpoints. TrustSec organizes and simplifies authentication and policy schema allowing administrators to configure and maintain identity-based access to IT resources while identifying and applying policy based on a user roles in the organization. TrustSec also provides encrypted links at the switch port level. Steven Song Security Business Manager in the Network Systems & Security group at Cisco Systems joins me to discuss TrustSec and how Cisco is expanding its services and importance for IT business leaders.