Unified Communications Featured Article

Cisco's UAS Solution Integrates Wireless, Network Management and Security Policy

October 08, 2012

The amount of data created every day is growing at an incredible rate, and according to Cisco (News - Alert), by 2016 the amount of mobile devices connected to networks will have to manage an estimated 19 billion devices, capable of handling 18 times the data generated by the mobile devices today.


Organizations have to quickly adapt to this growth and respond accordingly to this demand. Cisco’s Unified Access Solution (UAS) allows organizations to manage this growing data under one management solution for their entire network. As Bring Your Own Device (BYOD) policies become the standard, the chosen platform has to have the capability to integrate wired, wireless and Virtual Private Network’s (VPN’s) into a single unit.

The company’s UAS has one policy to manage the unified network with the Cisco Identity Service Engine (ISE) 1.1.1 and Secure Group Access (SGA). The tools provide security for automated systems across wired and wireless networks based on parameters set by the organization. The parameters will ensure access to the network is permitted only if the user, device and location have been validated.  ISE 1.1.1 has a portal with a simplified self-registration workflow for users and their devices.

The New Cisco Prime Infrastructure 1.2 consolidates wireless, wired, campus and branch network infrastructures into one system. This becomes critical as more devices are added to the network. Operators will be able to deploy, report, operate and administer network operations with an integrated workflow. Organizations with third-party network devices will be able to manage their equipment with the same simplicity.

The increase of data will need access points capable of handling numerous devices and applications. The New Cisco Aironet 2600 and 1600 Series Access Points complements previous models for enterprise solutions for midmarket customers. They deliver different capabilities such as the Cisco CleanAir spectrum intelligence and ClientLink 2.0 to improve performance and battery life on mobile devices. Additionall,y the new wireless controller for service providers and large enterprises provides a one rack unit capable of managing 6,000 access points and 64,000 clients.

Security is one of the biggest issues organizations wanting to implement BYOD policies face. To address the issues related to this problem, Cisco has contex-aware access security features with the Catalyst 2000 and 3000 Series switch platforms. 

An effective BYOD solution has to align the IT strategy of the company to meet the business goals while addressing challenges faced by everyone within the organization. The right architecture implements a mobile experience with elements across the organization’s network to deliver a safe and reliable level of WLAN performance.




Edited by Brooke Neuman

Article comments powered by Disqus

Featured Whitepapers

Building A Business Case For Unified Communications

The hype surrounding any emerging technology often shrouds the private sector with mixed feelings, as decision-makers try to decipher whether new offerings will enhance operations, hinder productivity or introduce some bizarre mixture of the two.

Instant Cashflow Improvement and Rapid ROI with Unified Communications

The up-and-down economy of the past several years has highlighted the need to operate more effi ciently and cut costs wherever possible. In most situations, these two notions would seem contradictory, but a number of emerging technologies - cloud computing, virtualization and the bring-your-own-device movement among them - are helping companies accomplish these goals.

The Top Four Pitfalls of Unified Communications

Today's enterprise needs to be agile if decision-makers wish to remain competitive and relevant in the eyes of consumers. As more companies and customers around the world begin leveraging innovative devices like smartphones, tablets and next-generation laptops, the need to deploy unified communications grows alongside it. Neglecting to implement the technology may result in dire consequences that could spell the end of an organization.