Cisco Blogs


Cisco Blog > Enterprise Networks

One Policy for the BYOD Challenge

January 15, 2013 at 5:45 pm PST

Man on LadderSeveral years ago, I had a conversation with an IT manager about his company’s network security that I still remember today. He said: “We’re losing our battle over internal network security. We cannot keep up with our vendors and contractors who bring in all kinds of devices to our network. We may turn our internal network into a DMZ.” Turning an internal network into a DMZ was probably an extreme case at that time but it showed the underlying problem: if you don’t have control over what’s happening on your network, you’ll have an uphill battle in your hands.

Today, the challenge has intensified due to the bring-your-own-device (BYOD) trend. There are speculations that corporate networks may eventually turn out to be the equivalent of college networks where users routinely bring their own personal devices. Because personal devices generally do not have the same level of security as IT-owned assets, they tend to have more vulnerabilities and it’s harder to protect sensitive information and intellectual property on these devices. The adage, “security risks walk in the door with employees” is quickly becoming a reality that organizations must address.

Read More »

Tags: , , , , , , , ,

Successfully Managing the Mobile Collaboration Experience

December 17, 2012 at 2:30 pm PST

Based on the conversations I have every day with Cisco customers, the impact of mobility on organizations cannot be denied.

Abundant data details how the proliferation of mobile devices is affecting communications, collaboration, and the way we do business today. For example, Cisco recently commissioned a Forrester Research report that looks at mobility, virtualization, and other enterprise-level technology initiatives. Nearly half the firms surveyed are implementing “bring your own device” (BYOD) programs to support employee-owned devices.

I’ve outlined my position in the past: BYOD is an opportunity, not a threat. There are profound benefits for organizations that embrace BYOD and mobilize the collaboration experience.

Collaboration is increasingly taking place on personal and company-provided mobile devices. According to a Read More »

Tags: , , , , , , , ,

Mobility and Virtualization in the Next-Generation Workplace

I’m one of the lucky ones. Many of my peers work in companies that aren’t as forward looking about IT as Cisco is. Where they struggle to keep up with the demands of today’s employees, I’m fortunate to work in an environment that offers workspace flexibility and access to telepresence, web conferencing, and a social platform based largely on the employee’s choice of device.

That’s not to say that we’ve got it all figured out at Cisco. As I onboard new college graduates, I, too, find myself struggling to meet their expectations. I think we’ve entered a phase in which all business and IT leaders will lag slightly behind the workplace expectations of the new generation.

To better understand this fundamental shift, we recently commissioned Forrester Research to look specifically at mobility, virtualization, and other enterprise-level technology initiatives.  Read More »

Tags: , , , , , , , ,

The Day I Lost My Mobile with Sensitive Corporate Data

November 26, 2012 at 8:18 am PST

It was a dark, cold, and scary night when I returned from dinner with friends and noticed that my mobile phone was missing. It had corporate sensitive data such as emails, calendar events, and documents, as well as personal data (including pictures, videos and other documents). Well, let me be honest with you, I didn’t really lose my phone. However, many cell phones, tablets, and other gadgets are lost or stolen on a daily basis. The problem of stolen mobile devices is huge. According to a report from the Federal Communications Commission (FCC) earlier this year, about 40 percent of robberies in Washington, D.C., New York, and other major cities now involve mobile devices. The FCC has teamed up with the nation’s top wireless carriers, including AT&T, Verizon, T-Mobile, and Sprint, to develop a database of stolen mobile devices.

Allowing employees to access corporate email, critical business applications and data makes workers more productive and effective. Finding just the right balance when allowing easy access to the applications that users need to be more productive, while maintaining the integrity and security of enterprise resources, will give your organization a competitive advantage.

Stolen and lost devices are among the many challenges of mobile device security.

Read More »

Tags: , , , , ,

Protect Data Centers with Cisco IPS: TechWiseTV Webinar

Data Centers are going through a rapid evolution due to industry trends of virtualization, cloud computing and bring your own device (BYOD) initiatives, putting an even greater strain on IT resources to secure the data, applications and access critical to the success of the business. Today’s data center must be secure and resilient to keep the enterprise running at maximum productivity; protecting its profitability and reputation.

The modern enterprise runs a wide array of commercial and customized applications, and the data within those applications is exactly what attackers are targeting. Those critical applications and servers within the data center continue to be the subject of targeted attacks and sophisticated malware. The 2012 Verizon Data Breach Report highlights that attacks against servers accounted for 94% of all data compromised last year. Strong security controls and visibility measures must be implemented to protect the integrity of the enterprise data center.

Click below to watch a Cisco TechwiseTV Workshop on protecting today’s data center using Cisco Intrusion Prevention Systems (IPS).

http://www.cisco.com/go/semreg/urls/105149/2/000071953

Tags: , , , , , ,