• 09/26/2007
    6:05 PM
  • Network Computing
  • News
  • Connect Directly
  • Rating: 
    0 votes
    Vote up!
    Vote down!

Cisco Expands 'Empowered Branch'

Cisco's 'Empowered Branch' drives business productivity, collaboration, operational simplicity with new routing and switching platforms
SAN JOSE, Calif. -- Cisco today marks the next evolution of its Empowered Branch framework with the introduction of new products and service innovations designed to enable greater business productivity and operational efficiency in enterprise branch offices. Collectively, the new products and services allow customers to standardize their branch architecture on a consistent set of security, unified communications, application acceleration and wireless services while optimizing branch performance and cost. Designed to facilitate interoperability, these additions enhance the overall branch experience to help lower the barriers to entry for wide service adoption in the branch and reduce the total cost of operations. These new innovations enhance Cisco's successful branch offerings as demonstrated by the Cisco Integrated Services Router and Cisco Catalyst® 2960 Series Switches reaching worldwide sales milestones of 3 million and 1 million, respectively.

Today's new Cisco Empowered Branch offerings include:

    Cisco 1861 Integrated Services Router (ISR). Offers a compact all-in-one unified communications solution and highly secure routing platform enabling anytime, anywhere access to business-critical information resulting in more effective communications and collaboration.

    Cisco Catalyst® 2960 Series Switches with LAN Lite Cisco IOS® Software. Reduces the network total cost of ownership by simplifying the migration from non-intelligent hubs and unmanaged switches to fully scalable managed switches with entry-level security, quality of service (QoS) and availability.

    Cisco Intrusion Prevention System Advanced Integration Module (IPS AIM). Scales security performance and threat-prevention, helping branch offices defend critical business processes against attack and disruption while protecting privacy and supporting policy and regulatory compliance.

We welcome your comments on this topic on our social media channels, or [contact us directly] with questions about the site.

Log in or Register to post comments