Big Data - Big, But Different
Big data is different in three ways: volume, variety, and velocity.
Learn how Cisco Maps allows us to locate people and resources.
Deploy and Manage BYOD
Connect to the network using any mobile device from anywhere.
Enterprise Networks IT Success Stories
Cisco is moving toward a flexible workspace.IT Method (PDF - 336 KB)
Connecting more people, data, and things to the Internet of EverythingIT Insights (PDF - 960 KB)
Cisco IT's BYOD program takes advantage of existing security architecture.IT Method (PDF - 398 KB)
Learn how Cisco Maps allows us to search for people and resources, locate the resource on a map, and take action.IT Insights (PDF - 276 KB)
Seven Essential Network Capabilities for the Internet of Everything - Part 3
Learn about the seven types of network intelligence to act on big data.IT Insights (PDF - 295 KB)
How Cisco IT Deployed and Manages BYOD
Connect to the network using any mobile device from anywhere.IT Method (PDF - 577 KB)
Big Data: Not Just Big, But Different – Part 2
Big data is different in three ways: volume, variety, and velocity.IT Insights (PDF - 310 KB)
Securing a Diverse, Global Network
Cisco IT uses ASA 5585-X appliances for frontline network security.IT Insights (PDF - 230 KB)
The Network: Artery and Brain for Big Data
- Part 1
Network Data is a New Form of Big Data.IT Insights (PDF - 226 KB)
Cisco IPS 4500 and 4300 Sensors have greater throughput and traffic flow processing.Trends in IT (PDF - 335 KB)
Cisco Expands IPv6 Web Presence
Cisco IT is realizing revenue through traffic relying on IPv6 connectivity.IT Method (PDF - 245 KB)
How Cisco Security uses StealthWatch and NetFlow to protect the network.IT Case Study (PDF - 261 KB)
The Internet of Everything is the biggest business opportunity in history.Trends in IT (PDF - 217 KB)
Bring Your Own Device (BYOD)
More employees are using personal devices to increase productivity and reduce costs.IT Insights (PDF - 988 KB)
Cisco Cloud Web Security
Cisco Cloud Web Security uses web filtering and web security to protect users from malware infections.IT Method (PDF - 392 KB)
Enriching Business Processes through the Internet of Everything
Connecting more people, data, and things to the Internet of Everything.