It was a dark, cold, and scary night when I returned from dinner with friends and noticed that my mobile phone was missing. It had corporate sensitive data such as emails, calendar events, and documents, as well as personal data (including pictures, videos and other documents). Well, let me be honest with you, I didn’t really lose my phone. However, many cell phones, tablets, and other gadgets are lost or stolen on a daily basis. The problem of stolen mobile devices is huge. According to a report from the Federal Communications Commission (FCC) earlier this year, about 40 percent of robberies in Washington, D.C., New York, and other major cities now involve mobile devices. The FCC has teamed up with the nation’s top wireless carriers, including AT&T, Verizon, T-Mobile, and Sprint, to develop a database of stolen mobile devices.
Allowing employees to access corporate email, critical business applications and data makes workers more productive and effective. Finding just the right balance when allowing easy access to the applications that users need to be more productive, while maintaining the integrity and security of enterprise resources, will give your organization a competitive advantage.
Stolen and lost devices are among the many challenges of mobile device security.
Read More »
Tags: Bring your Own Device (BYOD), data_protection, Identity Services Engine, mobile data, mobility, security
Data Centers are going through a rapid evolution due to industry trends of virtualization, cloud computing and bring your own device (BYOD) initiatives, putting an even greater strain on IT resources to secure the data, applications and access critical to the success of the business. Today’s data center must be secure and resilient to keep the enterprise running at maximum productivity; protecting its profitability and reputation.
The modern enterprise runs a wide array of commercial and customized applications, and the data within those applications is exactly what attackers are targeting. Those critical applications and servers within the data center continue to be the subject of targeted attacks and sophisticated malware. The 2012 Verizon Data Breach Report highlights that attacks against servers accounted for 94% of all data compromised last year. Strong security controls and visibility measures must be implemented to protect the integrity of the enterprise data center.
Click below to watch a Cisco TechwiseTV Workshop on protecting today’s data center using Cisco Intrusion Prevention Systems (IPS).
Tags: Bring your Own Device (BYOD), data center security, free webinar, intrusion detection, intrusion prevention, TechWiseTV, webinar
In my previous post, I mentioned that I’d briefly describe four initiatives Cisco promotes to help customers bridge the adoption gap. Most of all, adoption needs to be factored in at all phases of the plan-manage-build collaboration investment lifecycle. The biggest mistake organizations can make is to treat adoption as an afterthought or process that naturally occurs without prompting when a collaboration solution goes live.
Bridging the adoption gap begins with lowering the barriers to customer investment in collaboration-focused IT services by expanding the role of “as-a-Service” collaboration consumption models. Here, cloud computing is the enabling technology, but beyond that, Read More »
Tags: as-a-service, Bring your Own Device (BYOD), collaboration, collaboration deployment model, collaboration-as-a-service, Culture Change, mobility, Post-PC Era, ROI, SaaS, technology adoption
In the first part of this series I introduced the people in our new “at-a-glance” graphic (see end of this blog where I’ve embedded it) and looked at their diverse roles and the challenges that posed to IT. In this wrap-up blog, I focus on Bijad, the VP of IT, his understanding of the challenges and his response.
Bijad is the man in the middle of the evolution to a post-PC world. As the range of available collaboration technologies has continued to broaden, the focus for IT has begun to swing from delivering individual best-in-class applications to an interest in an integrated collaboration experience that delivers consistent functionality across multiple devices. However, this presents both a challenge and an opportunity. From the C-level suites, he is accountable for enabling this cost-effectively while providing a combination of scale, security, and accessibility through a variety of devices and operating systems. From his customers like Doug, Lee, Sarah, and Ben who you met in my previous blog, he’s hearing increasing demands for a rich, personalized, consistent user experience that lets each of them work and collaborate their way — where, when and how they want — without limits. They want tools to help them stay more connected with their peers and other organizations.
Bijad knows that this will require more flexibility and simplicity to preserve a consistent experience and that an open, interoperable architecture is key to success. Even more important, he knows that people, not technology, are the prime source of his company’s competitive differentiation. So he’s listening carefully, and thinking in terms of roles rather than devices.
To support Doug, the VP of sales, and people in similar highly-mobile, outward-oriented roles, Bijad is looking to Read More »
Tags: Bring your Own Device (BYOD), Cisco Customer Collaboration, Cisco Jabber, Cisco TelePresence, Cisco Unified Communications., Cisco WebEx Social, collaboration, Post-PC Era
In meeting with customers and partners, I hear repeatedly how key market transitions – mobility fueled by the Bring Your Own Device (BYOD) trend, cloud as a delivery model and the pervasive use of video – are dramatically shifting how organizations communicate and collaborate, both internally and externally. They want to collaborate from anywhere, at anytime, and on any device — with a superior user experience. For maximum business benefit, they want to accelerate collaboration services across their organization. They want options and they need agility.
Today, Cisco unveiled multiple enhancements to our Cisco Collaboration portfolio — delivered via public, private, hosted/managed cloud models — that provide customers access to an expanded set of market-leading collaboration offerings. Customers have greater choice in how they deploy collaboration offerings based on their specific needs or requirements. They also have new options for accelerating collaboration across their business quickly, securely, and reliably. Read More »
Tags: Bring your Own Device (BYOD), Cisco Customer Collaboration, Cisco TelePresence, Cisco Unified Communications., Cisco WebEx, cloud, cloud collaboration, collaboration, contact center