Cisco Blogs


Cisco Blog > Mobility

Unlocking the Connected Guest Experience

A recent article in the Wall Street Journal featured a hotel that will soon be using mobile technology to bypass the check-in process. Guests will have the option to check-in through their smartphone and also use their smartphone as their room key.

The benefit of this new check-in and room key innovation is two-fold: the hotel guests will benefit from the pure convenience of it and hoteliers can help maintain a secure property.

Antonio Connected Guest Keyless_futureMobility_2 25 14

However, automated check-in and the ability to use mobile devices as a key to the room is only one aspect of the entire technology stay. This is just one component of what’s possible and what’s going to be expected by guests visiting hotel properties in the future.

There is a tremendous demand by the guests to simplify and enhance their interaction with the hotel. According to a recent HVS London study, more modern hotel guests value experiences and the feeling of “being connected” over traditional hotel luxuries. With this in mind, the future of a connected guest experience does not begin and end with new keyless door entry capabilities.

In fact, the new technologies happening in hotels are also happening across various industries. New mobile capabilities in retail, education and transportation are creating new ways for customers, students and citizens to receive engaging content that can transform their experience. Some examples include:

  • Retailers can offer shoppers mobile updates when they are in the store about new products and special sale items.
  • College freshman can receive turn-by-turn directions to landmarks, buildings and events – all based on the student’s schedule and current location on campus. Read More »

Tags: , , , , , , , , , ,

Cisco at CCBN: Transforming Video Experiences

By Hanh Tu, Vice President, Great Chinahanh tu

CCBN (China Content and Broadcasting Network), the biggest cable industry trade show in Asia is happening between March 20-22, 2014 in Beijing, China. Cisco will be showcasing many cutting edge innovations around cloud, mobility and video to our customers and partners at the show.

As we enter the Internet of Everything era, service providers and media companies face challenges in finding better models to monetize the video ecosystems. For example, MSOs need to identify ways to benefit more from the booming internet video service delivery models, or be left behind.  Cisco understands and embraces the customers’ challenges, and moves together to turn them into opportunities and innovations. Customers and partners will be able to experience Read More »

Tags: , , , , , , ,

Summary: Tackling Mobile Security Risks for Government

As mobility becomes more pervasive, these concepts of cyber crime have become engrained in our work/life culture. These issues have earned national news headlines as governments across the globe grapple with how to build both secure and mobile-enabled infrastructures.

A few weeks ago, Cisco and Mobile Work Exchange released findings from a self-assessment tool that highlights some interesting statistics, enabling us to better understand mobile security best practices and vulnerabilities. The report specifically looks at government employees, 90 percent of whom claim to use at least one mobile device for work, and reveals that many government workers (41 percent) are putting themselves and their agencies at risk. Read More »

Tags: , , , , , , , , , , , , , , ,

Tackling Mobile Security Risks for Government

“Cyber threats. Security breaches. Hacking.”

As mobility becomes more pervasive, these words have become engrained in our work/life culture. The issue of cyber crime has earned national news headlines as governments across the globe grapple with how to build both secure and mobile-enabled infrastructures.

A few weeks ago, Cisco and Mobile Work Exchange released findings from a self-assessment tool that highlights some interesting statistics, enabling us to better understand mobile security best practices and vulnerabilities. The report specifically looks at government employees, 90 percent of whom claim to use at least one mobile device for work, and reveals that many government workers (41 percent)  are putting themselves and their agencies at risk.

Cisco_MobilitySecurity_PatFinn_Final

Here are a few other compelling findings:

  • On mobile devices, 31 percent use a public Wi-Fi connection and 25 percent do not set passwords.
  • 6 percent of government employees who use a mobile device for work say they have lost or misplaced their phone. In the average Federal agency, that’s more than 3,500 chances for a security breach.
  • Despite the Federal Digital Government Strategy, more than one in four government employees have not received mobile security training from their agencies.

Read More »

Tags: , , , , , , , , , , , , , , ,

A Balanced Approach to Mobile Security

Gartner recently made three interesting predictions about mobility in the workplace. While the ideas are compelling, they only offer one-side of the story, and the solution.

In this blog post, I’ll take a deeper look at each of these predictions and discuss why the future of mobility rests on IT leaders taking a balanced and strategic approach to security that focuses more on protecting the network and proprietary data and less on implementing overly broad restrictions.

Gartner Prediction #1: Twenty percent of BYOD projects will fail by 2016 due to IT’s “heavy hand.”

While the actual failure rate may be less than one-fifth, mobility efforts will fail if companies are too restrictive with MDM policies. Instead, a two-fold approach to supporting a BYOD environment from a security perspective is essential.

First, IT leaders should take a balanced approach to security that protects business-imperative network solutions and data. In most cases, blocking Angry Birds and Candy Crush is unnecessary and not scalable. With Apple and Google supporting over a million apps each (and counting), it can cost precious time and IT resources just trying to keep up with restricting non-threatening applications.

Secondly, IT leaders should be focused on encouraging users to use secure solutions. This will only grow more important as the explosion of new connections and various devices evident in today’s Internet of Everything world creates more opportunity for malicious actors to utilize even more inroads to compromise users, networks, and data. By educating employees to take an active role in the security of their device, users can be empowered to report suspicious threats and have an open dialogue with IT teams. Read More »

Tags: , , , , , , , , , , , ,