In a world where people are always on the go, it’s only natural that employees will use their own mobile platforms more often for collaboration. However, the increase in the Bring Your Own Device (BYOD) trend for collaboration purposes brings about a number of security concerns in the workplace.
There are multiple capabilities that go into delivering an enterprise-class BYOD solution. The recent attention around the National Security Agency (NSA) surveillance leak may have organizations across the globe reevaluating their strategies when it comes to BYOD security, but there are tools to minimize threats, such as: user authentication, network access control, and remote data wipe
We understand the need for an emphasis on security and have developed the tools to minimize the threat when it comes to your organizations’ BYOD strategy. Please take a look at our CTO of Collaboration, Laurent Philonenko’s recent No Jitter article about the many options and factors to consider when planning your BYOD security strategy.
Tags: byod, collaboration, Laurent Philonenko, no jitter, security
The data center landscape is undergoing remarkable transformation and security is being forced to evolve as organizations embrace more dynamic services.
For instance, Gartner predicts 17.9% CAGR in cloud services usage through 2016. As such, Chief Information Security Officers (CISOs) will need to consider how to secure non-standardized Business-to-Business interconnects across their organizations. CISOS will play a pivotal role in shaping the next-generation data center if they are able to act more strategically.
I call this my 3 imperatives for CISOs.
I am teaming up with my former mentor from McAfee and now colleague through our Cisco partnership, Rich Noguera, Sr Manager, Security Strategy and Risk Management at Accenture, to discuss this topic on July 16- 8:00 am PST/ 11:00 am EST
1. Enabling IT security to play a more strategic and advisory role within the organization – today’s CISO needs to think much more in terms of establishing a risk-aware culture as increasingly the economic advantages of moving to the cloud becomes much more compelling. Strategically speaking, CISOs must consider building or buying a cloud services brokerage that is capable of enforcing corporate security policies across the business’ varied providers. There is an opportunity to shift IT away from being considered a necessary cost center to a department, which can enable self-provisioning of new services (with the right tools and training). But to do this, it requires a forward thinking organization with a security steering committee with stakeholders from across the enterprise engaged to ensure that security and risk considerations are factored in.
2. Business-driven security and risk metrics -- It is a well-known phenomenon that when nothing negative in data center security happens (for example, malware disruption, data breach), it may become challenging to demonstrate the ROI on security even though security met its purpose. Leading organizations are twice as likely to use metrics to monitor progress and their ability to deal with future technologies as well as metrics to justify the purchase and need of new technologies. As the old adage goes, ‘you cannot manage what you cannot measure.’ Given the range of cloud enabled B2B services, CISOs should concentrate on what matters most – who (i.e. users) and what (i.e. crown jewel data) – to the security of the business.
3. Balancing key technology focus areas with risk metrics - As data center workloads spiral and so too, correspondingly does the volume of security data, CISOs and security teams will need to find ways to filter data to a meaningful metrics. That is where expressing security policy in business contextual terms and security intelligence data and filtering becomes critical.
Register here for this webcast on July the 16th to further discuss these key issues and see how datacenter can enable security to be transformative. Additionally, for more news and discussions, head over to @SecDatacenter or Secure Data Center Trends
Tags: Accenture, Cisco, CISO, data center security
At Cisco we often talk about mobile workers and mean the types of employees who travel to other cities, states, and countries, or (even) work from home. However, there is another type of mobile worker we’re helping. Someone I’ll call the “on-premise mobile worker”. While this person may have a desk, they also have to travel around a small geography while keeping in touch with others on the job. Think of police traveling within their city, local transportation employees surveying roadways and tunnels, or school resources officers on a school campus. For many years these on-premise mobile workers kept in touch with radio. Eventually, some moved to mobile phones or tablets. However, organizations with these types of workers often use more than one type of device and need a blended solution. A way to use both radio and IP together.
With this in mind, Cisco has introduced the Cisco IP Interoperability and Collaboration system solution. While the name is a mouthful – even the acronym IPICS is long – what this solution offers is quite simple. . Cisco IPICS helps organizations create a unified, integrated radio and IP communications system. With this unified approach they’re able to manage distributed teams of people and mission critical communications over multiple radio networks and systems. This, in turn, helps improve incident response and decision making.
Cisco IPICS Solution Overview
At Denton Independent School District in Texas, school resource officers have central command centers and rely on desktops with multiple large monitors. However, they also have a field of school safety officers who are usually mobile as they traverse hallways and classrooms. With Cisco IP Interoperability and Collaboration Systems (IPICS), they can still perform their security duties while mobile, and monitor events continuously as they are moving to the scene. Principals use IPICS on their iPads and iPhones to allow them to access any camera in the district from classrooms, hallways, cafeterias. With remote access capability they have increased situational awareness, and improved decision making with the ability to track the movement of individuals by switching camera views, which allows them to go straight to where they are needed, and resolve the situation much faster.
Cisco is now shipping its new IP interoperability and Collaboration System (IPICS) solution version 4.6, providing a new set of multivendor, interoperable communications capabilities for operations and dispatch centers across government and enterprise industries.
Cisco IPICS IP Dispatch Console
This new release of IPICS expands virtualization to the Cisco Unified Computing System (UCS)E-Series, expands the Cisco open IP standards called Digital Fixed Station Interaface (DFSI) and offers customers a new SolutionPlus touch screen interface from IP Trade.
The IPICS Dispatch console has a new feature called “tear away items” allowing dispatchers to customize their screen real estate and includes new telephony features such as global phone book providing instant telephony communications with critical personnel.
Cisco’s IPICS 4.6 represents the next generation in open multivendor platforms. New features and functions in this release include the following:
- Direct radio network interoperability—This release supports Inter RF Subsystem Interface (ISSI), Console Sub-System Interface (CSSI), and TIA P25 Digital Fixed Station Interface (DFSI) standards.
- DFSI Gateway—This release includes a new P25 Conventional Gateway called DFSI gateway.
- IP Command Touch Screen Dispatch Console—This new touch-screen dispatch capability is available through IP Trade, a Cisco SolutionsPlus partner.
IP Trade Touchscreen Console
- Cisco Video Surveillance (VSM) Manager 7 support—Allows the integration of VSM videos with incidents.
- Key management—This release provides features to manage the storage and distribution of keys for IDC users in “End to End” ISSIG mode, ISSI gateways, and DFSI gateways. These keys are used to encrypt and decrypt voice traffic on P25 TalkGroups and P25 Fixed Stations
- TETRA radios—This release supports the configuration and use of TETRA radios.
- SNMP configuration of SNMP V2 options for Cisco IPICS.
- Language support to include French (Canadian), Portuguese, Russian, and Spanish.
- Cisco IP Phone high availability—The IPICS IP Phone client now supports high availability.
- Updated Cisco UCS support—This release is extended as a virtualized application on the Cisco Unified Computing System (UCS) E-Series.
- Enhanced IP Dispatch Console features such as “Tear away items”—You can customize the appearance of the IDC by moving various items from the IDC Main window to any location on your computer screen and enhanced call transfer features allow consultative and blind call transfers, and an address book that lets you access and manage multiple contact lists and quickly call or send email to a contact
As Public Safety LTE standards evolve, users with dual mode phones will be able to roam between carrier based LTE networks and D-Block public safety LTE networks.
External Press Release
IPICS 4.6 data sheet
Universal Media Services data sheet
P25 Gateway data sheet
At this year’s Hadoop Summit 2013
, I presented on the “The Data Center and Hadoop” which built upon the past two years of testing the effects of Hadoop on the data center infrastructure
. What makes Hadoop an important framework to study in the data center is that it contains a distributed system that combines both a distributed file system (HDFS) along with an execution framework (Map/Reduce). Further it builds upon itself and can provide other real-time or key/value stores(HBASE) along with many other possibilities. Each comes with its own set of infrastructure requirements that include throughput sensitive components along with latency sensitive components. Further in the Data Center, understanding how all these components work together is key to optimized deployments.
After studying many of these components and their effects, the very data we were alanyzing became a topic of a lot of our discussions. We combined application performance data, application logs, compute data AND network data to build a complete picture of what is happening in the data center.
With the advent of programmable networks (aka “Software Defined Networking”) it is not only important to make the network more application aware, but to also know where and how to analyze and make the right connections between the application and the network.
Tags: Big Data, Cisco Nexus, data center, Hadoop, Hadoop Summit, nexus, SDN, software defined networking
Milestones and markers are important. They give us a chance to reflect and to celebrate, and they inspire us with what’s next. I’m very pleased to share that Cisco has just been granted its 10,000th U.S. patent. And worldwide we’ve surpassed 13,000 patents awarded to Cisco innovators.
By the measure of patents, Cisco’s journey started in February 1988, when the company’s first patent was filed. To put that time in context, that was the year President Ronald Reagan gave his last State of the Union address in his second term, U.S. sprinter Florence Griffith Joyner (aka Flo-Jo) set a still-standing women’s world record (21.34 seconds) in the 200-meter dash at the 24th Summer Olympic Games in Seoul, Korea, and also the year when the Morris worm was distributed via the Internet, initially written to gauge the size of the Internet.
Read More »