Mobile Device Management

May 25, 2021

NETWORKING

If you can’t trust a MAC address, what can you trust?

3 min read

The concept of random and changing MAC addresses is not brand new, but is beginning to have a real impact on how network tools operate. The idea that operating system vendors are providing users with increasing privacy by making it harder for big corporations to track them is a double edged sword. How can networking tools continue to provide critical services such as network access control, guest and BYOD services in an environment where the identifier of the endpoint, the MAC address, is no longer stable.

October 3, 2018

SECURITY

pxGrid 2.0 Context-In and Dynamic Topics Enable Collaborative Security

3 min read

With the new pxGrid 2.0 architecture, we have added a new capability that allows ISE to take in additional context for the purpose of classifying IoT devices.

October 3, 2018

SECURITY

Apple + Cisco + IBM = Next Level Mobile Security

2 min read

Now with IBM added to our partnership equation with Apple, mobile security with the Cisco Security Connector has never been better.

Mobility management TCO is more than just your telecom bill

2 min read

Need to stem the skyrocketing cost of mobility management? Don’t just zero in on your monthly bills. Managing mobility across thousands of employees racks up many expenses far beyond your...

November 13, 2017

DIGITAL TRANSFORMATION

New Forrester Research – Optimize Mobility Management TCO with Automation

2 min read

Business mobile devices can be a lifeline for increasing your employee productivity – but how do you realize value when the costs of managing enterprise mobility are so high?

February 20, 2014

SECURITY

Secure Access for the Real World, Really?

2 min read

Yes, really. I just got back from Cisco Live! Milan where Chris Young, Senior VP at Cisco, spoke to the Cisco security story, Intelligent Cybersecurity for the Real World. The Cisco security strategy addresses many security challenges across a range of attack vectors (network, endpoint, mobile devices, cloud, or virtual). It covers the entire attack […]

January 17, 2014

NETWORKING

What Next for BYOD?

2 min read

One of the interesting and challenging aspects of working in the Mobility space is the sheer pace at which the industry is moving.  I’m fortunate to work with many Customers in EMEA to help support and shape their strategy towards Mobile technology.  A great example of this has been the reaction to BYOD. The influx […]

April 4, 2013

SECURITY

Consider the Best Approach for Your BYOD Mobility Environment

4 min read

Mobile devices have quickly become a mainstay in enterprise environments and continue to be consumer driven, and yet they find their way into our day-to-day business lives. As these new devices are being brought into the work environment by employees, enterprise IT is increasingly being forced to accommodate for business use. This is not new news. We observe this pattern through our customers today and live this phenomenon within our own everyday work environment at Cisco. Here at Cisco, employees have the flexibility to choose their device and to securely connect to voice, video and data services from anywhere under an Any Device policy. Cisco manages over 64,000 mobile devices today.

March 21, 2013

SECURITY

Cisco AnyConnect + SAFE™

1 min read

6,000 miles away from Cisco headquarters, the Cisco AnyConnect Secure Mobility Client for Android was showcased at Samsung’s SAFE™ (Samsung for Enterprise) booth at Mobile World Congress 2013