Cisco Systems

Displaying 1-40 of 279 results

  • White Papers // May 2015

    Five Secrets of Highly Effective Data Centers

    More than ever, the data center is a gateway to opportunity, responsible for bringing together the data, applications, and IT resources needed to support growth and innovation. At Cisco we have the opportunity to observe how data center infrastructure is evolving in response to market and technology trends. In no...

    Sponsored By Cisco Systems

  • White Papers // May 2015

    A Data Center Fabric Is Critical to a Next-Generation Data Center

    The data center has gone through many major evolutionary changes over the past several decades, and each change has been defined by major shifts in architectures. The industry moved from the mainframe era to client/server computing and then to Internet computing. In 2011, another major shift began: the shift to...

    Sponsored By Cisco Systems

  • White Papers // May 2015

    Campus Wireless LAN

    Cisco Validated Designs (CVDs) present systems that are based on common use cases or engineering priorities. CVDs incorporate a broad set of technologies, features, and applications that address customer needs. Cisco engineers have comprehensively tested and documented each design in order to ensure faster, more reliable, and fully predictable deployment.

    Sponsored By Cisco Systems

  • White Papers // May 2015

    Cisco Validated Design Summary for BYOD

    There are numerous ways to enable a BYOD solution based on the unique business requirements of a specific organization. While some organizations may take a more open approach and rely on basic authentication, other organizations will prefer more secure ways to identify, authenticate, and authorize devices. A robust network infrastructure...

    Sponsored By Cisco Systems

  • White Papers // May 2015

    Hybrid Will Be the New Normal for Next Generation Enterprise WAN

    Public cloud services and mobility are driving business needs where the Internet and MPLS play an equally important role for enterprise connectivity. Network planners must establish a unified WAN with strong integration between these two networks to avoid application performance problems.

    Sponsored By Cisco Systems

  • White Papers // May 2015

    Cisco and Akamai Elevate the Customer Digital Experience

    The term “perfect storm” is used to describe when several forces come together and create a large, single event that has transformative effects. A technology perfect storm took place in the 1990s when Internet services, low-cost home computers, browsers and affordable broadband all came together and created the Internet revolution....

    Sponsored By Cisco Systems

  • White Papers // May 2015

    Miercom 2690-X Report

    Cisco engaged Miercom to conduct a competitive analysis of its Catalyst 2960-X switch versus two comparable Hewlett-Packard switches from the 2920 and 5120 product families. Miercom executed comprehensive hands-on testing and evaluated the performance of some widely deployed features that are critical for reliable functioning of enterprise networks. The test...

    Sponsored By Cisco Systems

  • White Papers // May 2015

    Magic Quadrant for WAN Optimization

    WAN optimization increasingly resembles a mature market with increasing feature standardization. Vendor innovation is focused on supporting new application types and deployment options, with WAN optimization migrating toward more diverse platforms or to a WAN cloud.

    Sponsored By Cisco Systems

  • White Papers // May 2015

    Integrated Network Security Architecture: Threat-focused Nextgeneration Firewall

    Most large organizations address network security with an army of tactical point tools like firewalls, VPN gateways, IDSs/IPSs, network proxies, malware sandboxes, web and e-mail gateways, etc. This messy array of independent technologies was adequate ten years ago, but now presents a plethora of operational, policy enforcement, and monitoring challenges....

    Sponsored By Cisco Systems

  • White Papers // May 2015

    Next-Generation Network Security: A Buyers’ Guide

    Today’s adversaries continue to increase their capabilities faster than the defenses deployed to stop them. Whether they are obfuscating their attacks or hiding malicious code within webpages and other files, they are making it more and more difficult to profile and identify legitimate network traffic. This is especially true in...

    Sponsored By Cisco Systems

  • White Papers // May 2015

    IDC MarketScape: Worldwide Enterprise Videoconferencing Equipment 2014 Vendor Assessment

    The worldwide enterprise videoconferencing equipment market has been experiencing some downs lately — with consecutive quarters and two years of declining revenue growth in 2013 (-13.1%) and 2012 (-5.0%). This is mostly attributed to the impact of delayed customer buying decisions, lower-cost systems, more software-centric solutions, and the rise of...

    Sponsored By Cisco Systems

  • White Papers // May 2015

    Video Forrester Wave

    In Forrester’s 24-criteria evaluation of videoconferencing infrastructure and cloud services vendors, we identified the 10 most significant OEMs — Acano, AGT, Avaya, Blue Jeans Network, Cisco Systems, Lifesize, Pexip, Polycom, Videxio, and Vidyo — in the category and researched, analyzed, and scored them. This report details our findings about how...

    Sponsored By Cisco Systems

  • White Papers // May 2015

    Achieve More with Video Collaboration - Cisco CMR

    As the workforce becomes more mobile and distributed, leaders recognise that video is an essential component of effective business collaboration. Video conferencing is becoming more pervasive, as it delivers a range of proven benefits to teams and orqanisations. Cisco Collaboration Meeting Rooms (CMR) ...

    Sponsored By Cisco Systems

  • Research // Mar 2015

    Cisco Annual Security Report 2015

    Despite advances by the security industry, criminals continue to evolve their approaches to break through security defenses. New threat intelligence and trend analysis in the Cisco 2015 Annual Security Report show that attackers are realizing that bigger and bolder are not always better. Understand how attackers are using gaps between...

    Provided By Cisco Systems

  • White Papers // Mar 2015

    IDC Brief - Assessing the Business Value of the Secured Datacenter

    With recent high-profile breaches at some of the largest retailers and financial institutions worldwide, there has been an increase in awareness, rising to the executive and even board levels. This IDC Brief explores the shift to "3rd Platform" era which is built on a foundation of mobile, social, Big Data,...

    Provided By Cisco Systems

  • Research // Mar 2015

    Frost Industry Quotient - Asia- Pacific Network Firewall Vendors 2014

    A new paradigm shift in IT security is starting to emerge as enterprises begin to accept the possibility that their organizations may be breached, even after they have invested significantly in security technologies to prevent such incidents from happening. As a result, more enterprises are looking beyond a preventive approach,...

    Provided By Cisco Systems

  • White Papers // Mar 2015

    Continuous Endpoint Threat Detection and Response in a Point-in-Time World

    The only way to defeat today’s security threats is to address them holistically across the full attack continuum - before, during, and after an attack. Cisco’s approach of continuous endpoint analysis in combination with a big data architecture is foundational to this model. Our innovations in advanced malware protection include:...

    Provided By Cisco Systems

  • White Papers // Dec 2014

    COFFE: Ciphertext Output Feedback Faithful Encryption

    "In this paper, the authors introduce the first authenticated encryption scheme based on a hash function, called COFFE. This paper has been motivated by the challenge to fit se-cure cryptography into constrained devices - some of these devices have to use a hash function, anyway, and the challenge is to...

    Provided By Cisco Systems

  • White Papers // Dec 2014

    Experiments in Encrypted and Searchable Network Audit Logs

    "Network telemetry in the form of NetFlow, IPFix, Syslogs and others, constitute important data about network activity. Such telemetry is considered valuable for network planning, security forensics and audits. The authors consider the scenario where a consumer can securely outsource their network telemetry data to a Cloud Service Provider (CSP)...

    Provided By Cisco Systems

  • White Papers // Dec 2014

    University Cuts $1 Million in Annual Travel Costs

    At the University of Notre Dame, faculty and staff use Cisco WebEx™ products to collaborate with colleagues, to communicate with overseas students, and to reduce travel costs. Notre Dame administrators cite WebEx’s cross-platform support and ease of use as the primary reasons it’s become so popular among instructors and students....

    Provided By Cisco Systems

  • Research // Sep 2014

    IDC Research - Redefining Enterprise Mobility and Increasing Success with Mobile Collaboration

    Adoption of enterprise mobility has surged in the Asia/Pacific region, but this context of mobility tends to be defined as the individual worker being “untethered” from the traditional workplace. While workers have mobile access, they still do not have all that they need to complete a task or project. Download...

    Provided By Cisco Systems

  • Research // Sep 2014

    ZK Research 2014 - Best Practices for Building a Mobility Strategy

    Granting you employees mobile access can have major business benefits. But realizing those benifits is no longer only about providing simple device access. Now it's about facilitating great user experiences, increasing productivity and maintaining the security of your business through it all. Download this new ZK Research white paper and...

    Provided By Cisco Systems

  • Research // Sep 2014

    International Mobile Security Survey Research and Considerations for Enterprise IT

    To better understand the rising security challenges associated with integrating mobile devices into business operations, Cisco recently conducted an international survey that explored the attitudes and experiences of end users worldwide. This survey provides insights on how best to approach providing your workers with productive, flexible, and secure network access...

    Provided By Cisco Systems

  • White Papers // Sep 2014

    An Automated, Application-Aware Foundation for the Modern Enterprise

    Enterprises have seen massive change over the last decade, but one thing has remained consistent: the Enterprise Network. This article provides insight on an adaptable and programmable network platform to stay ahead of enterprise trends such as BYOD, Cloud Adoption and Xaas

    Provided By Cisco Systems

  • White Papers // Sep 2014

    An Automated, Application-Aware Foundation for the Modern Enterprise

    Enterprises have seen massive change over the last decade, but one thing has remained consistent: the Enterprise Network. This article provides insight on an adaptable and programmable network platform to stay ahead of enterprise trends such as BYOD, Cloud Adoption and Xaas

    Provided By Cisco Systems

  • White Papers // Sep 2014

    Optimally Manage the Data Center Using Systems Management Tools from Cisco and Microsoft

    IT Managers and administrators constantly seek strategies on how to holistically manage and orchestrate server and networking infrastructure and the software stack. Download this Information guide on best practices to optimally manage the data center using systems management tools from Cisco and Microsoft.

    Provided By Cisco Systems

  • White Papers // Sep 2014

    The Cisco ONE Enterprise Networks Architecture Enables Business Transformation

    Every C-level executive is focused on transforming the business, and IT leaders are tasked with providing them with the evolving network infrastructure and support. Download this whitepaper to learn how Cisco ONE enterprise networks architecture enables business transformation and provides the necessary levels of application intelligence, contextual information, visibility and...

    Provided By Cisco Systems

  • Case Studies // Sep 2014

    Staffing Services Firm Projects One-Year ROI for SpeedLink VPN

    Randstad Holding is headquartered in Diemen, Netherlands and specializes in solutions in the field of flexible work and human resources services. Their challenges are they need to improve profit margins by reducing costs for data and voice communications, expand simultaneous calling capacity and manage network efficiently with small, dedicated team....

    Provided By Cisco Systems

  • Case Studies // Sep 2014

    City Attracts Visitors with Free Outdoor Wi-Fi

    The Adelaide city center is the vibrant cultural hub of Adelaide, the capital city of South Australia. Spanning 15.5 square kilometers, the area comprises stores, restaurants, parklands, and city squares. Their challenges are they need stimulate local economy by attracting people to city center businesses, lower connectivity costs for mobile...

    Provided By Cisco Systems

  • Case Studies // Aug 2014

    Shopping Center Landlord Enhances Customer Experience with Wi-Fi Services

    With 400 million customer visits, including over 30 million unique customers every year, intu is one of the biggest names in retail in the United Kingdom. Their challenges are they need to provide a multichannel shopping experience, enable shoppers to connect with social networks, stream video, and opt-in for personalized...

    Provided By Cisco Systems

  • Presentations // Jun 2014

    WebEx Viewpoints: Collaboration in the Workplace

    Find out how companies are using WebEx to achieve outstanding results. Millions of users across the globe use WebEx to make stronger connections, complete projects faster, and reach more prospects, customers, and employees.

    Provided By Cisco Systems

  • Presentations // Jun 2014

    WebEx Viewpoints: Improving Sales Teams

    WebEx enables sales teams to effectively and efficiently connect with customers around the globe. Find out how companies are using WebEx to achieve outstanding results. Millions of users across the globe use WebEx to make stronger connections, complete projects faster, and reach more prospects, customers, and employees.

    Provided By Cisco Systems

  • Training // Jun 2014

    WebEx Viewpoints: Training

    WebEx allows companies to train employees effectively, anytime and anywhere. Find out how companies are using WebEx to achieve outstanding results. Millions of users across the globe use WebEx to make stronger connections, complete projects faster, and reach more prospects, customers, and employees.

    Provided By Cisco Systems

  • Presentations // Jun 2014

    WebEx Viewpoints: Hosting Webinars

    Use WebEx to host webinars, tell your story and connect to global audiences. Find out how companies are using WebEx to achieve outstanding results. Millions of users across the globe use WebEx to make stronger connections, complete projects faster, and reach more prospects, customers, and employees.

    Provided By Cisco Systems

  • Training // Jun 2014

    WebEx Tutorial: Key Features

    Learn how easy Webex Meetings makes hosting webinars, sharing screens and attending online meetings. Drive success by connecting with your audience and completing projects faster.

    Provided By Cisco Systems

  • White Papers // May 2014

    Cisco WebEx Meeting Center

    Cisco WebEx Meeting Center is the easy-to-use, low-cost way to share ideas with anyone, anywhere, anytime, from any device. Collaborate over the web with remote employees, customers, and suppliers. Deliver presentations, demonstrate applications and update spreadsheets. Save time and money on travel — conduct regular meetings...

    Provided By Cisco Systems

  • Case Studies // Jan 2014

    Pinellas County Integrates Wired and Wireless Networks

    Pinellas County is Florida's most densely populated county. Located on a compact peninsula bounded to the east by Tampa Bay and to the west by the Gulf of Mexico. Their challenges are to move from limited separate wireless LANs to cohesive countywide wired-wireless network encompassing 53 locations and 111 buildings...

    Provided By Cisco Systems

  • Case Studies // Jan 2014

    Courting Students with Next-Generation Wireless

    Universit

    Provided By Cisco Systems

  • Downloads // Dec 2013

    Cisco WebEx Meetings

    Collaborate and share before, during, and after your meeting. Introducing Meeting Spaces – upload and share an agenda, files, and contacts. Meet wherever you want – your office, iPhone, smartphone, even your iPad! Record and replay your meetings and share with colleagues. No one has to miss a thing.

    Provided By Cisco Systems

  • Case Studies // Nov 2013

    Cisco Scored the Decisive Goal at the San Siro

    Giuseppe Meazza is the Milan soccer stadium and the highest-capacity sports facility in Italy. Their challenges are to provide Internet access to photographers and journalists, implement a comprehensive BYOD architecture, guarantee access to users with tailor-made security policies and comply with UEFA guidelines for 4-star stadiums. They chose Cisco to...

    Provided By Cisco Systems

  • White Papers // May 2015

    Achieve More with Video Collaboration - Cisco CMR

    As the workforce becomes more mobile and distributed, leaders recognise that video is an essential component of effective business collaboration. Video conferencing is becoming more pervasive, as it delivers a range of proven benefits to teams and orqanisations. Cisco Collaboration Meeting Rooms (CMR) ...

    Sponsored By Cisco Systems

  • White Papers // May 2015

    Five Secrets of Highly Effective Data Centers

    More than ever, the data center is a gateway to opportunity, responsible for bringing together the data, applications, and IT resources needed to support growth and innovation. At Cisco we have the opportunity to observe how data center infrastructure is evolving in response to market and technology trends. In no...

    Sponsored By Cisco Systems

  • White Papers // May 2015

    A Data Center Fabric Is Critical to a Next-Generation Data Center

    The data center has gone through many major evolutionary changes over the past several decades, and each change has been defined by major shifts in architectures. The industry moved from the mainframe era to client/server computing and then to Internet computing. In 2011, another major shift began: the shift to...

    Sponsored By Cisco Systems

  • White Papers // May 2015

    Campus Wireless LAN

    Cisco Validated Designs (CVDs) present systems that are based on common use cases or engineering priorities. CVDs incorporate a broad set of technologies, features, and applications that address customer needs. Cisco engineers have comprehensively tested and documented each design in order to ensure faster, more reliable, and fully predictable deployment.

    Sponsored By Cisco Systems

  • White Papers // May 2015

    Cisco Validated Design Summary for BYOD

    There are numerous ways to enable a BYOD solution based on the unique business requirements of a specific organization. While some organizations may take a more open approach and rely on basic authentication, other organizations will prefer more secure ways to identify, authenticate, and authorize devices. A robust network infrastructure...

    Sponsored By Cisco Systems

  • White Papers // May 2015

    Hybrid Will Be the New Normal for Next Generation Enterprise WAN

    Public cloud services and mobility are driving business needs where the Internet and MPLS play an equally important role for enterprise connectivity. Network planners must establish a unified WAN with strong integration between these two networks to avoid application performance problems.

    Sponsored By Cisco Systems

  • White Papers // May 2015

    Cisco and Akamai Elevate the Customer Digital Experience

    The term “perfect storm” is used to describe when several forces come together and create a large, single event that has transformative effects. A technology perfect storm took place in the 1990s when Internet services, low-cost home computers, browsers and affordable broadband all came together and created the Internet revolution....

    Sponsored By Cisco Systems

  • White Papers // May 2015

    Miercom 2690-X Report

    Cisco engaged Miercom to conduct a competitive analysis of its Catalyst 2960-X switch versus two comparable Hewlett-Packard switches from the 2920 and 5120 product families. Miercom executed comprehensive hands-on testing and evaluated the performance of some widely deployed features that are critical for reliable functioning of enterprise networks. The test...

    Sponsored By Cisco Systems

  • White Papers // May 2015

    Magic Quadrant for WAN Optimization

    WAN optimization increasingly resembles a mature market with increasing feature standardization. Vendor innovation is focused on supporting new application types and deployment options, with WAN optimization migrating toward more diverse platforms or to a WAN cloud.

    Sponsored By Cisco Systems

  • White Papers // May 2015

    Integrated Network Security Architecture: Threat-focused Nextgeneration Firewall

    Most large organizations address network security with an army of tactical point tools like firewalls, VPN gateways, IDSs/IPSs, network proxies, malware sandboxes, web and e-mail gateways, etc. This messy array of independent technologies was adequate ten years ago, but now presents a plethora of operational, policy enforcement, and monitoring challenges....

    Sponsored By Cisco Systems

  • White Papers // May 2015

    Next-Generation Network Security: A Buyers’ Guide

    Today’s adversaries continue to increase their capabilities faster than the defenses deployed to stop them. Whether they are obfuscating their attacks or hiding malicious code within webpages and other files, they are making it more and more difficult to profile and identify legitimate network traffic. This is especially true in...

    Sponsored By Cisco Systems

  • White Papers // May 2015

    IDC MarketScape: Worldwide Enterprise Videoconferencing Equipment 2014 Vendor Assessment

    The worldwide enterprise videoconferencing equipment market has been experiencing some downs lately — with consecutive quarters and two years of declining revenue growth in 2013 (-13.1%) and 2012 (-5.0%). This is mostly attributed to the impact of delayed customer buying decisions, lower-cost systems, more software-centric solutions, and the rise of...

    Sponsored By Cisco Systems

  • White Papers // May 2015

    Video Forrester Wave

    In Forrester’s 24-criteria evaluation of videoconferencing infrastructure and cloud services vendors, we identified the 10 most significant OEMs — Acano, AGT, Avaya, Blue Jeans Network, Cisco Systems, Lifesize, Pexip, Polycom, Videxio, and Vidyo — in the category and researched, analyzed, and scored them. This report details our findings about how...

    Sponsored By Cisco Systems

  • Webcasts // Jul 2007

    Best Practices for Migrating Your First Generation SANs to Cisco MDS 9000

    With the ongoing quest to efficiently manage the many costs of the data growth, many organizations are considering their options to migrate from a first generation SAN platform to a SAN Director platform. But before one realizes the benefits, he or she first needs to address the challenges associated with...

    Provided By Cisco Systems

  • White Papers // Jul 2007

    Understanding EtherChannel Load Balancing and Redundancy on Catalyst Switches

    Fast EtherChannel allows multiple physical Fast Ethernet links to combine into one logical channel. This allows load sharing of traffic among the links in the channel as well as redundancy in the event that one or more links in the channel fail. Fast EtherChannel can be used to interconnect LAN...

    Provided By Cisco Systems

  • White Papers // Jul 2009

    The Agile Business Architecture: Creating Service Provider Value Through Smart Sourcing

    The service provider industry has experienced rapid and significant transformation over the past five years as broadband has proliferated, networks have enabled ubiquitous mobility, and IP has become the de facto technology standard. Over-The-Top (OTT) providers such as Google, Apple, and Amazon, the rising stars of this transformation, are now...

    Provided By Cisco Systems

  • White Papers // Jul 2009

    Best Practices for Monitoring Cisco Unified Contact Center Enterprise With Cisco Unified Operations Manager

    This paper highlights suggested best practices for field personnel and customers. It will help enables one to effectively use Cisco Unified Operations Manager to monitor Cisco Unified Contact Center Enterprise. Cisco Unified Operations Manager (referred to as Operations Manager from this point forward) provides a unified view of the entire...

    Provided By Cisco Systems

  • White Papers // Jul 2009

    Cisco and Fluke Networks End-to-End Application Performance Management Solution for Managed Services

    By taking advantage of APM solutions from Cisco and Fluke Networks, MSPs and IT departments that operate in a similar manner have full visibility into application performance and can align network resources and control utilization according to business priority and application requirements and accelerate the performance of applications to essentially...

    Provided By Cisco Systems

  • White Papers // Jun 2009

    Deploying CiscoWorks LAN Management Solution 3.x in a Virtualized Environment

    Virtualization is the new buzz that is on the lips of everyone from IT professionals to executives. Everyone benefits in his or her own way. This paper introduces the option of installing the CiscoWorks LAN Management Solution (LMS) 3.x bundle on a virtualized platform. It looks at each solution, its...

    Provided By Cisco Systems

  • White Papers // Jun 2009

    Multiservice Activation and Deactivation in a CoA Message

    This feature allows multiple services to be activated or deactivated by a single Change of Authorization (CoA) message sent from the policy server. This feature is similar to the Multiservice Activation in Access-Accept Message feature, but in this case it is assumed that the user session is already active. The...

    Provided By Cisco Systems

  • White Papers // Oct 2008

    Using Oracle Data Guard With Cisco Wide Area Application Services for Data Center Replication

    Oracle Data Guard is one of the most effective and comprehensive data protection and disaster recovery solutions available for enterprise data. The solution offers protection for Oracle Databases, providing customers the ability to protect business data. Cisco Wide Area Application Services (WAAS) optimizes the performance of many different applications by...

    Provided By Cisco Systems

  • White Papers // Dec 2008

    Advances in Physical Safety and Security in Government: Protect People, Assets, and Information

    The new building blocks of physical safety and security in government are IP video surveillance systems, building access controls, unified communications, and network access controls. All connect to the government's existing IP network, eliminating the costs of separate networks. IP video surveillance cameras can pay for themselves quickly: Wireless cameras...

    Provided By Cisco Systems

  • White Papers // Jun 2009

    CiscoWorks LAN Management Solution 3.2 Large-Scale: Deployment Guide

    This white paper provides an outline and recommendations for deploying CiscoWorks LMS server. It also tries to highlight some of the best practices related to the deployment of large-scale networks and makes the user aware of the scaling characteristics of the various individual CiscoWorks products. Its implementation may vary -...

    Provided By Cisco Systems

  • White Papers // Feb 2009

    Best Practices in Using Reputation-Based Anti-Spam Services for Email Security

    One of the most efficient, least costly and, remarkably, most effective anti-spam techniques is IP reputation filtering. An incredibly inexpensive technique for the anti-spam gateway, IP reputation filtering can be used to identify 80 percent (or more) of spam without even looking at message content. IP reputation services have become...

    Provided By Cisco Systems

  • White Papers // Mar 2009

    Comparing Industry Leading Anti-Spam Services

    The following analysis summarizes the spam catch and false positive rates of the leading anti-spam vendors. Compiled by Opus One, an independent research firm, this report provides data to objectively compare the market's most popular anti-spam solutions. All of the anti-spam solutions tested are in Gartner's 2008 "Leaders" or "Challengers"...

    Provided By Cisco Systems

  • Resource Center // Oct 2009

    Cash In Your PBX -- Upgrade with Cisco. Gain significant new savings now

    PBX systems and old telephony applications were just not built for today's business needs. They don't scale easily, struggle to support mobility, and are increasingly expensive to maintain. Hang up on your PBX and get significant trade in credits, 0 percent financing, plus all the benefits of IP from...

    Provided By Cisco Systems

  • Webcasts // Jun 2009

    802.11n for K-12: Empower Learning and Collaboration With High-Speed Wireless

    The attendee of this webcast will discover how to empower greater learning and collaboration for the school and school district with 802.11n wireless. The presenters of this webcast discuss how the Cisco Unified Wireless Network is providing reliable wireless services to their teachers, students, guests, and administrators. The attendee will...

    Provided By Cisco Systems

  • Webcasts // Jun 2009

    802.11n for Higher Education: Exceed Your Mobility and Wireless Expectations

    The attendee of this webcast will learn how to exceed the mobility expectations of the students, faculty, staff, and administrators with 802.11n wireless. The presenters will discuss the benefits of their pervasive Cisco Unified Wireless Network. The attendee will gain insight into the value of high-performance wireless for the delivery...

    Provided By Cisco Systems

  • Webcasts // Jun 2009

    Beyond Casual Mobility: Building Wireless LANs That Scale

    The attendee of this webcast will learn strategies for deploying high scale, wireless LANs. Discover tips for architecting wireless LANs that integrate with the wired LAN and scale to meet a variety of application needs across an array of topologies. The attendee will find out how to validate the performance...

    Provided By Cisco Systems

  • Webcasts // May 2009

    Cisco Data Center Interconnect (DCI) Solutions

    The presenter of this webcast will provide the latest information on Cisco Data Center Interconnect (DCI) Solutions, a key element of Cisco Data Center 3.0 vision and strategy, providing a range of capabilities designed to meet LAN extension business requirements. The attendee of this webcast will learn about Cisco DCI...

    Provided By Cisco Systems

  • Presentations // Mar 2009

    Unite Data Center Technologies with the Cisco Unified Computing System - Flash Overview

    Cisco is transforming the data center. Learn more about the foundation technologies of the Cisco Unified Computing Architecture and how Cisco has unified data center technologies, simplified the infrastructure, and amplified system functionality over legacy server deployments. See key functionality of the Cisco Unified Computing System that you can leverage...

    Provided By Cisco Systems

  • Resource Center // Aug 2008

    Networking Solutions for Small Business

    Networking solutions for small business can keep your employees connected and productive whether they are. Learn how.

    Provided By Cisco Systems

  • Resource Center // Feb 2009

    Basic Networking: What You Need to Know

    Basic networking consists of two essential pieces of equipment: switches and routers. If you know how this hardware works, you'll have a fundamental understanding of basic networking as well. Knowing more about basic networking can help you make better decisions about the network design, services, and features your business needs...

    Provided By Cisco Systems

  • Resource Center // Feb 2009

    How Does a Network Switch Work?

    How does a network switch work? How does it compare to a hub or router? This page offers a brief overview that explains the differences between these essential pieces of network hardware.

    Provided By Cisco Systems

  • Webcasts // Sep 2008

    Optimizing 802.11n Design and Performance

    Fueled largely by the emergence of new applications and the need for nonstop access to voice and video by mobile users, demand for 802.11n is growing rapidly. This webcast will help the attendee to gain a technical understanding of how to optimize design and performance for 802.11n networks so one...

    Provided By Cisco Systems

  • White Papers // Jun 2009

    10 Steps to Deploying a High-Performance Fault-Tolerant SAN Using Dell EqualLogic PS Series Storage and Cisco Catalyst Network Infrastructure

    The Dell EqualLogic family of iSCSI SANs is fundamentally changing the way enterprises think about purchasing and managing storage. Built on a virtualized peer storage architecture, the Dell EqualLogic PS Series simplifies the deployment and administration of consolidated storage environments. Its all-inclusive, intelligent feature set streamlines purchasing and delivers rapid...

    Provided By Cisco Systems

  • White Papers // Jun 2009

    Network Foundation Protection

    This paper describes the best practices for securing the network infrastructure itself. This includes setting a security baseline for protecting the control and management planes as well as setting a strong foundation on which more advanced methods and techniques can subsequently be built on. Later in this paper, each design...

    Provided By Cisco Systems

  • White Papers // Jun 2009

    SAFE Overview

    The ever-evolving security landscape presents a continuous challenge to organizations. The fast proliferation of botnets, the increasing sophistication of network attacks, the alarming growth of Internet-based organized crime and espionage, identity and data theft, more innovative insider attacks, and emerging new forms of threats on mobile systems are examples of...

    Provided By Cisco Systems

  • White Papers // Jun 2009

    Combating Botnets Using the Cisco ASA Botnet Traffic Filter

    This paper discusses the nature of botnets, the threats they pose to today's networks, and how the Cisco Botnet Traffic Filter enables Cisco ASA appliances to fight botnets and to handle their dynamic nature. A botnet is a collection of autonomous software robots (bots), typically malicious in nature, that operate...

    Provided By Cisco Systems

  • White Papers // Nov 2008

    Data Leakage Worldwide: The High Cost of Insider Threats

    The findings from a global security study on data leakage revealed that the data loss resulting from employee behavior poses a much more extensive threat than many IT professionals believe. Commissioned by Cisco and conducted by U.S.-based market research firm InsightExpress, the study polled more than 2000 employees and information...

    Provided By Cisco Systems