Employees, and many business, want to allow personal devices to be used at work, and potentially for work. However, balancing that with corporate policies for information security, clear rights-of-use, liability, and then bounding it within an acceptable IT cost structure is no small feat. Cisco joined forces with leading MDM vendors to link together a solution that starts at day zero – when an employee first buys a new device and tries to use it at work. It includes self-service onboarding to the network, offering a choice of using a device as a guest or work asset, and forced enrollment in (and compliance with) MDM when business policy must be enforced.
Citrix recently acquired Zenprise to add top-tier MDM to their mobile workspace and application management solution. The good news is Zenprise is an early MDM partner with Cisco, and Citrix inherits the integration work. The tight linkage of Cisco’s Unified Access Solution, and the Cisco Identity Services Engine, to what is now Citrix XenMobile MDM, is a powerful combination for customers to deploy since it brings quite a bit more to the table than standalone MDM.
Tags: citrix, Identity Services Engine, ISE, MDM, Mobile Device Management, mobile device security, mobile devices, unified access, Zenprise
Add this to your list of parties spoilt by the Internet revolution: national sovereignty.
We all know that the borderless nature of the Internet is stretching longstanding technical and legal definitions. But recently, my colleague Richard Aceves and I got to talking about the mish-mash that social media is making of culture, language, and national identity. It should come as no surprise that cultures and languages are being diluted by the global online discussion, in the same way that the advent of television and radio had a dampening effect on certain regional spoken colloquialisms and accents. Richard will examine some cultural questions in a forthcoming blog post, while I’ll be discussing the psychological impact on national sovereignty.
Judging by the proliferation of Internet policies and legislation, it is pretty clear that bureaucrats and politicians in capital cities around the world are worried that the Internet (with special thanks to social media) is simultaneously eroding both their authority and their national identity. Read More »
Tags: Cisco Security, internet policies and legislation, internet security, social media
Recently, I spent time with some of our customers discussing recent security events and the threat landscape. As a leader for vulnerability handling, we often have to deliver news regarding our products that can cause significant disruption for patching and remediation. I always appreciate the time that customers take to provide feedback on our products and services.
The dominant topic during conversations with customers was the threat landscape, specifically the Distributed Denial of Service (DDoS) attacks that have and are currently taking place. While DDoS attacks are certainly not new territory for our industry, there were some interesting observations we discussed regarding the nature and impact of such activities. Read More »
Tags: DDoS, Denial of Service attack, distributed denial of service, security
During the 2012 fall season, we launched a survey that seeks to understand how you use and value the security resources on the Cisco Security Intelligence Operations Portal at http://cisco.com/security. At the same time we also made available our enhanced feedback mechanism—shown below highlighted in red—to allow you to more easily share your thoughts and frustrations with our content.
The response has been fantastic; thank you.
Through the new survey and feedback systems, we are broadening our understanding of the content-types you find useful, those you don’t, as well as content you’re not familiar with. We have received very specific questions and feedback and done our best to respond directly when we could (did you include an email address?) and have responded publicly via @CiscoSecurity a few times when no contact information was shared. For example, when an anonymous feedback-submitter suggested we provide RSS feeds for Cisco Security Advisories, we responded via Twitter with:
@CiscoSecurity: A friendly reminder, RSS feeds for all Cisco SIO content types, including Security Advisories, are available at http://cs.co/9007VQr7
Read More »
Tags: customer feedback, security, survey
My colleague, Dario Ciccarone from the Cisco Product Security Incident Response Team (PSIRT) will be presenting “Security Vulnerability Handling at Cisco” at (ISC)2’s New York Metro Chapter meeting on February 13th, 2013. This will be an evening of information security presentations, networking reception and filled with Chapter activity discussions during this event. This event also qualifies for 2 CPEs for certified information security professionals (CISSP). Read More »
Tags: Cisco PSIRT, Cisco Vulnerability Policy, security, vulnerability