If you’re like most companies, your remote work program until now made up a subsection or possibly a small part of your work force and operations. Some positions were ideally suited for it such as project managers or specialized tech support that are out and about remotely working. For most staff members, remote work was limited to short windows such as an occasional snow day or a family matter that forced them home for one reason or another. Some companies recently have allowed employees to work from home one day a week as a perk or incentive to improve company retention rates.
Posts by Greg LaBrie
Sophisticated business models require networking solutions that offer high-performance without increased complexity. As the need for interconnectivity across all sections of business continues to rise, enterprises are increasingly turning to secure SD-WAN for their networking needs.
When it comes to upper level executives and their IT security teams, there seems to be a disconnect when it comes to the level of support IT needs to protect the enterprise. In order to better prevent a security breach from is happening, it’s important that the C-level executives are aware and on the same page with your enterprise security team. Only 12% of C-suite executives expect a major, successful attack on their organization in the next 90 days. In addition, two out of five CEOs, other C-level executives, and non-executive directors feel they are not responsible for the repercussions of a cyber-attack. Any breach that is caused by the void between these important roles has serious costs associated with them.
Picture the following. You are lying in the intensive care unit of an area hospital having just gone through the ordeal of major open-heart surgery. The IC medical staff is depending on medical IoT devices to monitor you. Question, do you feel better having your collected data make the journey across the Internet for analysis at a distant cloud location, or analyzed in near instant fashion at the hospital itself where the medical staff is?
The concept of intent-based networking is indeed an evolutionary leap in how we design, manage and maintain the enterprise networks of today. Gartner a while back actually coined the phrase of IBN. Rather than relying on manual intervention, intent-based networking incorporates AI and machine learning to automate administrative tasks and functions.
Applications are the backbone of business-critical operations, and their use is increasing at an almost exponential rate – especially among distributed enterprises with multiple remote offices. To support this, many are switching from performance-inhibited wide-area networks (WANs) to software-defined wide-area-network (SD-WAN) architectures.
We could probably list 80 things to know about Cisco DNA Center, but for the sake of brevity, we will keep it to single digits. We say this because there is so much to this all-inclusive network management platform. This solution is the next step in network evolution. Its singular yet expansive platform includes a variety of tools that integrate with so many network functions and technologies. Some of these include network management, automation, virtualization, analytics, assurance, security, compliance and IoT connectivity. Cisco DNA Center is at the epicenter of Cisco Digital Network Architecture, which is Cisco’s architectural blueprint for today’s expansive enterprise networks. Regardless of the complexity of your hybrid architectures that incorporate multiple campuses, remotes branch and cloud architectures, Cisco DNA Center can help simplify it.
It is hard to say when it happened, but everything has gone digital. We have a digital economy today that involves digital products and services. In order to take advantage of newly found digital opportunities within the digital space, companies are undergoing digital transformations. In order to compete in an environment of perpetual digital change, companies are creating digital strategies that incorporate digital technologies that will allow them to better compete in the digital marketplace.
One of the natural traits of people is to long for the “good old days.” It is that magical era we tend to memorialize as a time when things were simpler and uncomplicated. That is certainly true of network security. Remember when all you had to do was simply protect your network perimeter? Can you even define what your network perimeter is anymore? It’s not so easy to answer that question today.
The demand for wireless access from users has shifted from a convenience to a necessity – which means network performance has become a business-critical requirement. Both workers and consumers have come to expect a reliable Wi-Fi connection, and the absence of one can influence their decision on how long they remain at the establishment.