Simple and secure for small businesses

1 April 2020 Information Security

Cisco is accelerating its focus on serving small businesses by announcing new offers tailored to the small business buyer. In November 2019, Cisco introduced the new Cisco Designed for Business portfolio at its partner summit. Now the portfolio is growing with the addition of Cisco technology that originally powered Fortune 100 organisations and can now bring the same technology innovation to meet the needs of small businesses.

Small business is big business and accounts for 44% of all IT spending – as a segment it’s faster growing than the enterprises segment according to the World Trade Organisation. Now more than ever, small businesses need to be agile when digitising their business models. Ultimately, technology is critical to helping them grow their revenue, optimise their customer experiences and differentiate themselves to remain competitive. Small businesses need to connect securely and focus on protecting their users, data and devices at all times.

To help address these needs and allow small businesses to focus on their core activities, Cisco is announcing brand new updates to its Designed for Business portfolio bringing together the power of machine learning, AI and cloud-driven solutions and created to make buying, installation and maintenance simple. The simplified experience includes:

• New app to manage small business networks: IT systems can be complex and expensive to maintain, especially with the limited IT resources of a small business. The new Cisco Business Wireless Mobile App provides a simple way for an individual or company to configure and manage networks in any location, all from the convenience of their smartphone. Available in the Apple App Store (iOS) or on Google Play (Android).

• New user experience. Simpler to buy: A new button to connect small business customers to a Cisco partner to buy directly on Cisco.com.

• New bundles and offers scaled for small businesses: To further reduce cost and complexity while improving operational efficiency, bundled solutions will be available that focus on key technology areas to support rapidly growing businesses.

• Secure connectivity via Meraki: Network downtime and security issues can impact revenue, customer loyalty and data security. Bringing together the high-speed and high-density capabilities of Wi-Fi 6 to the cloud-managed Meraki portfolio of access points, the new Meraki Wi-Fi 6 Access points bring simple network management and help with improved network performance, reliability and security – without the need for more IT staff.

Cisco’s first Wi-Fi 6 access point for small businesses brings flexibility to growing businesses looking to digitise quickly. The technology will enable their network to scale to effectively manage more connected devices and richer content like video, as well as provide better performance as new applications emerge.

• Meraki Cloud-managed smart cameras: Not only can cameras help reduce inventory shrinkage and other risks, they are also powered to deliver valuable business insights on areas ranging from foot traffic to identifying which displays are attracting attention to parking utilisation. These new cameras include high-quality video, wireless connectivity, on-appliance storage and built-in advanced analytics, eliminating costs involved in sending traffic to a data centre. They offer a 360-degree view through a fisheye camera and one unit can cover an entire premise efficiently for small businesses.  

Find out more at https://www.cisco.com/c/en/us/solutions/small-business.html




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

The year of the agent
Information Security AI & Data Analytics
The dominant attack patterns in Q4 2025 included system-prompt extraction attempts, subtle content-safety bypasses, and exploratory probing. Indirect attacks required fewer attempts than direct injections, making untrusted external sources a primary risk vector heading into 2026.

Read more...
AI cybersecurity predictions for 2026
AI & Data Analytics Information Security
The rapid development of AI is reshaping the cybersecurity landscape in 2026, for both individual users and businesses. Large language models (LLMs) are influencing defensive capabilities while simultaneously expanding opportunities for threat actors.

Read more...
SMARTpod Talks to Check Point Technologies about the African Perspectives on Cybersecurity report
SMART Security Solutions News & Events Information Security Videos
SMART Security Solutions spoke with Check Point's Hendrik de Bruin about the report, the risks African organisations face, and some mitigation measures.

Read more...
Securing the smart fleet
Information Security Transport (Industry) Logistics (Industry) IoT & Automation
Contributing around 10 to 12% of South Africa’s GDP, the transport and logistics sector supports almost every part of the country’s economic activity. The stakes for keeping these systems secure are higher than ever before.

Read more...
Who are you?
Access Control & Identity Management Information Security
Who are you? This question may seem strange, but it can only be answered accurately by implementing an Identity and Access Management (IAM) system, a crucial component of any company’s security strategy.

Read more...
Check Point launches African Perspectives on Cybersecurity report
News & Events Information Security
Check Point Software Technologies released its African Perspectives on Cybersecurity Report 2025, revealing a sharp rise in attacks across the continent and a major shift in attacker tactics driven by artificial intelligence

Read more...
What is your ‘real’ security posture?
BlueVision Editor's Choice Information Security Infrastructure AI & Data Analytics
Many businesses operate under the illusion that their security controls, policies, and incident response plans will hold firm when tested by cybercriminals, but does this mean you are really safe?

Read more...
What is your ‘real’ security posture? (Part 2)
BlueVision Editor's Choice Information Security Infrastructure
In the second part of this series of articles from BlueVision, we explore the human element: social engineering and insider threats and how red teaming can expose and remedy them.

Read more...
Sophos announces evolution of its security operations portfolio
Information Security
Sophos has announced significant enhancements to its security operations portfolio via Sophos XDR and Sophos MDR offerings, marking an important milestone in its integration journey following the acquisition of Secureworks in February 2025.

Read more...
Cybersecurity operations done right
LanDynamix SMART Security Solutions Technews Publishing Information Security
For smaller companies, the costs associated with acquiring the necessary skills and tools can be very high. So, how can these organisations establish and maintain their security profile amid constant attacks and evolving technology?

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.