Gadgets, gadgets and more gadgets. They are coming like mushrooms after a soaking spring shower. More than 80 tablets were launched at the Consumer Electronics Show (CES) in early Jan. On top of that, Microsoft announced that a future version of its Windows OS will run on ARM-based chips that power mobile phones and tables, in addition to the x86 chips used for PCs. A 4G wireless version of Cisco’s mobile business tablet Cius made news with a joint announcement with Verizon Wireless. It’s a sign of the times that the buzzword “app” was voted the 2010 “Word of the Year” by the American Dialect Society. And one more thing: IDC predicts that in 2012, the number of mobile devices is likely to reach 462 million, exceeding PC shipments.
Today, almost one in five (18%) employees is not allowed to use their iPods at wok, based on Part II of Cisco’s Connected World Report. But this trend is unlikely to continue. Employees expect to have more flexible work options including mobility. So how do you prepare your organization’s mobile computing strategy, to help achieve best employee productivity and user experience?
The iPad is one of the hottest gifts for this holiday season. Kids and adults alike are hoping to receive one as a gift from others or as a gift for themselves. It will be a busy time for the App Store for sure and many of the adults will probably be trying to use their iPad to access corporate email or other information.
Cisco’s gift for those users is Cisco AnyConnect for the iPad, making that corporate user more secure. The market-leading secure mobility client, positioned as a leader by Gartner in the recent 2010 Magic Quadrant for SSL VPNs , is now available on the Apple App Store free of charge. Companies with AnyConnect Essentials or Premium VPN licenses on their Cisco ASA 55000 can now allow their employees to connect using the iPad. Companies can now realize the value of Cisco Secure Mobility and Borderless networks. They can connect anyone, anywhere—securely, reliably, and seamlessly. Read More »
Mobility is changing the way I work. I work in the office, at home and wherever I am between the two. Not only do I have a smartphone, I also have an iPad and a corporate laptop. I access email and work using all three devices, happy that I can seamlessly connect from anywhere, at anytime, from any device. I am not unlike many workers today where work is becoming an activity and not a place and I need consistent security enforcement and protection, particularly when I am outside of the office.
Three letters enable much of this, V – P – N. VPNs are not new but Cisco continues to innovate with new VPN and secure mobility solutions to secure mobile workers like me. For instance, in October Cisco announced AnyConnect 3.0 that ties the client to web security in the cloud via Cisco ScanSafe in addition to an on-premise Web Security Appliances and the AnyConnect client is now available for both the Apple iPhone and iPad running iOS version 4.2+. Read More »
Join us on Tuesday, December 14th, for our upcoming live Ask The Expert event, inside Cisco Live and Networkers Virtual. This event will be coming to you live from India, the first in our international Ask The Expert Series. Ask the Expert events are part of our content partnership with the Cisco Support Community. Take advantage of these opportunities to get answers to your questions live, in real-time, by a Cisco expert.
Join Cisco expert Vikas Saxena, a customer support engineer (CCIE security number 19971) at the Technical Assistance Center, Security and VPN team in India as he provides information on configuration basics of AnyConnect SSL VPN Client on ASA through ASDM. He will also provide information on concepts of profiles, tunnel groups, group policies, and troubleshooting of common problems associated with AnyConnect SSL VPN client.
Yesterday I talked about the vital importance of passwords in the quest to avoid victimization, but today I will take a look at how some recent changes and advances in technology can have an impact as well.
Some of the fundamental tenants of Borderless Networks include the fact that the network is evolving. No longer the classical, hard crunchy shell with the soft chewy middle, the network has become more open, more amorphous and more mobile. Because of these factors, the network is far more available and useful to users wherever they are, at home, on the road or even chilling at *bucks. Indeed, to illustrate the ubiquity of Borderless Networks, I even saw a woman emailing on a smartphone in the middle of a Zumba class (comic aside, my participation in Zumba is a lot like an inebriated bear doing ballet, but that is a different story). The network is no longer confined to the safe castle-keep of the Enterprise, but instead now follows us wherever we go. This creates opportunities, such as receiving email from the boss while you sip a latte at a coffee shop, but it also creates vulnerabilities as well, which we will come back to.