In this Fireside Chat, CEO- Sean Barr, sat down with a few of our engineers to discuss what today's rapidly advancing technologies mean for the IT industry and the skill sets IT teams will need as we look into the future of IT.
Technology advances more rapidly today than ever before. We are hearing more and more tech companies integrating artificial intelligence and virtual or augmented reality into their platforms and products. The exponential growth in cloud computing is drives demand for flexible or “pay as you go” consumption models. As technology becomes more advanced and user-friendly it is becoming integrated into every aspect of our lives. As we integrate technology more and more into our business, there is an increased need for cybersecurity and data availability. But what does this all mean for the IT industry and the skill sets our IT teams will need as we look into the future of IT?
Collaboration solutions for the modern workforce are focused more and more on enabling the mobile workforce, and why should security be any different? Today’s workforce is digitizing rapidly with more and more companies’ business model reflecting trends like mobility and “bring your own device”. The exponential growth of online devices is expected to grow from 15B today to 500B by 2030. With increased digitization comes security advancements and an increased need for networks security.
By this time, I’m sure you’ve all heard about the whole SD-WAN, or Software Defined Wide Area Network, craze hitting the industry. Heck, if you are reading this now, it probably means you are in the process of researching, piloting, or operating one yourself. This is great news! However, if you are looking for a high-level, marketing overview of the four pillars of an SD-WAN, then you are probably in the wrong place! In this article, I’m going to pass on some information from my personal experiences with one SD-WAN solution, Cisco IWAN.
Whether you're making the jump to cloud with Cisco Spark or sticking with your existing on premise Unified Communications implementation, the push to enable collaboration is happening in businesses across all verticals. The need to enable collaboration and empower employees to work from anywhere while maintaining the same level of collaboration as an in-person interaction is in high demand. This need is driven by the influx of millennials into the workforce, the fact that no one likes commuting, or a bit of both.
Yesterday Cisco hosted the Cisco Spark Launch in San Francisco, CA. The event included an exclusive look at the latest Cisco Spark innovations, hands-on demonstrations, and thoughts and remarks from event hosts Chuck Robbins, CEO, and Rowan Trollope, SVP and GM of Cisco's IoT and Applications.
Currently I am working on a project where I am going through and optimizing a large set of Access Control Lists (ACL) on a set of 5585 Firewalls. While going through each ACL I have noticed a few mistakes other engineers have made while configuring these rules. I have compiled a list of these common mistakes. The focus of this blog will be around ACLs on Cisco ASA’s; however these rules still apply to other devices as well.
Enjoy the first Fireside Chat. Fireside Chats are a LookingPoint video series where we bring casual technology conversations to you! This week we are discussing one of the hottest topics of 2017: SD-WAN. Sit back, relax, and enjoy a nice fireside chat.
Learn more about SD-WAN here.
The title to this blog is a question that I have been hearing a lot from customers in the last few months. With Gartner’s recent prediction that spending on SD-WAN will rise from $129 million in 2016 to $1.24 billion in 2020, I figured it’s about time I write up a little blog article all about this latest offering to revolutionize the enterprise WAN, or perhaps not!
Today, the most significant cyber threat is Ransomware – a type of malicious software designed to hold a user’s files (such as healthcare records, financial contracts, software codes, and other documents) for ransom by encrypting them and demanding the user pay a fee to decrypt them. Ransomware attacks use sophisticated infrastructure and resilient techniques to target data and hold critical infrastructure hostage. This advanced cyber threat, a familiar–and unwelcome–issue in IT security circles, has become one of the top enterprise cyber-security threats of 2016. Ransomware is the most profitable malware in history – in the first 3 months of 2016 cyber-criminals collected $209 million!
Subscribe to the informative Newsletter to be Notified Updates in the Technology world.