Simple and secure for small businesses

1 April 2020 Information Security

Cisco is accelerating its focus on serving small businesses by announcing new offers tailored to the small business buyer. In November 2019, Cisco introduced the new Cisco Designed for Business portfolio at its partner summit. Now the portfolio is growing with the addition of Cisco technology that originally powered Fortune 100 organisations and can now bring the same technology innovation to meet the needs of small businesses.

Small business is big business and accounts for 44% of all IT spending – as a segment it’s faster growing than the enterprises segment according to the World Trade Organisation. Now more than ever, small businesses need to be agile when digitising their business models. Ultimately, technology is critical to helping them grow their revenue, optimise their customer experiences and differentiate themselves to remain competitive. Small businesses need to connect securely and focus on protecting their users, data and devices at all times.

To help address these needs and allow small businesses to focus on their core activities, Cisco is announcing brand new updates to its Designed for Business portfolio bringing together the power of machine learning, AI and cloud-driven solutions and created to make buying, installation and maintenance simple. The simplified experience includes:

• New app to manage small business networks: IT systems can be complex and expensive to maintain, especially with the limited IT resources of a small business. The new Cisco Business Wireless Mobile App provides a simple way for an individual or company to configure and manage networks in any location, all from the convenience of their smartphone. Available in the Apple App Store (iOS) or on Google Play (Android).

• New user experience. Simpler to buy: A new button to connect small business customers to a Cisco partner to buy directly on Cisco.com.

• New bundles and offers scaled for small businesses: To further reduce cost and complexity while improving operational efficiency, bundled solutions will be available that focus on key technology areas to support rapidly growing businesses.

• Secure connectivity via Meraki: Network downtime and security issues can impact revenue, customer loyalty and data security. Bringing together the high-speed and high-density capabilities of Wi-Fi 6 to the cloud-managed Meraki portfolio of access points, the new Meraki Wi-Fi 6 Access points bring simple network management and help with improved network performance, reliability and security – without the need for more IT staff.

Cisco’s first Wi-Fi 6 access point for small businesses brings flexibility to growing businesses looking to digitise quickly. The technology will enable their network to scale to effectively manage more connected devices and richer content like video, as well as provide better performance as new applications emerge.

• Meraki Cloud-managed smart cameras: Not only can cameras help reduce inventory shrinkage and other risks, they are also powered to deliver valuable business insights on areas ranging from foot traffic to identifying which displays are attracting attention to parking utilisation. These new cameras include high-quality video, wireless connectivity, on-appliance storage and built-in advanced analytics, eliminating costs involved in sending traffic to a data centre. They offer a 360-degree view through a fisheye camera and one unit can cover an entire premise efficiently for small businesses.  

Find out more at https://www.cisco.com/c/en/us/solutions/small-business.html




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Who are you?
Access Control & Identity Management Information Security
Who are you? This question may seem strange, but it can only be answered accurately by implementing an Identity and Access Management (IAM) system, a crucial component of any company’s security strategy.

Read more...
Check Point launches African Perspectives on Cybersecurity report
News & Events Information Security
Check Point Software Technologies released its African Perspectives on Cybersecurity Report 2025, revealing a sharp rise in attacks across the continent and a major shift in attacker tactics driven by artificial intelligence

Read more...
What is your ‘real’ security posture?
BlueVision Editor's Choice Information Security Infrastructure AI & Data Analytics
Many businesses operate under the illusion that their security controls, policies, and incident response plans will hold firm when tested by cybercriminals, but does this mean you are really safe?

Read more...
What is your ‘real’ security posture? (Part 2)
BlueVision Editor's Choice Information Security Infrastructure
In the second part of this series of articles from BlueVision, we explore the human element: social engineering and insider threats and how red teaming can expose and remedy them.

Read more...
Sophos announces evolution of its security operations portfolio
Information Security
Sophos has announced significant enhancements to its security operations portfolio via Sophos XDR and Sophos MDR offerings, marking an important milestone in its integration journey following the acquisition of Secureworks in February 2025.

Read more...
Cybersecurity operations done right
LanDynamix SMART Security Solutions Technews Publishing Information Security
For smaller companies, the costs associated with acquiring the necessary skills and tools can be very high. So, how can these organisations establish and maintain their security profile amid constant attacks and evolving technology?

Read more...
AI security with AI Cloud Protect
Information Security
AI Cloud Protect is now available for on-premises enterprise deployments to secure AI model development, agentic AI applications, and inference workloads with zero impact on performance.

Read more...
Kaspersky finds security flaws that threaten vehicle safety.
News & Events Information Security Transport (Industry)
At its Security Analyst Summit 2025, Kaspersky presented the results of a security audit that exposed a significant security flaw enabling unauthorised access to all connected vehicles of one automotive manufacturer.

Read more...
The overlooked risks of everyday connectivity
Information Security
That free Wi-Fi you are using could end up costing you a lot more money than your hotspot data if it has been compromised, says Richard Frost, head of technology solutions and consulting at Armata Cyber Security.

Read more...
Syndicates exploit insider vulnerabilities in SA
Information Security Security Services & Risk Management
Today’s cyber criminals do not just exploit vulnerabilities in your systems; they exploit your people, turning trusted team members into unwitting accomplices or deliberate collaborators in their schemes.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.