Cisco Blogs


Cisco Blog > Security

2014: More Secure Access, Please

January 9, 2014 at 1:30 pm PST

Are you back from holiday break all refreshed and ready to embrace 2014 with confidence?

Many organizations will see new devices on their networks given the recent massive holiday gift giving. In particular, educational organizations will be morst likely to be impacted. It seems there was no new hot toy (must-have gift) noted this year because kids want electronics. A recent survey indicated that 88% of kids ages 12 to 17 said that they most wanted a gadget as a holiday gift, with the majority (69%) requesting some kind of Apple device.

Students are returning to school with their shiny new electronic mobile devices and no hesitation to access the resources at school. Educational institutions continue to strive to enable users, while minimizing potential risk, and security continues to be the top concern.

Secure AccessConsider this:

Secure Mobility in Higher Education

Secure Mobility in K-12 Education

The challenge of secure mobility will persist as the device storm continues. 2014 opens with the Consumer Electronics Show in Las Vegas, January 7-10. The last couple years the show highlighted latest smart phones and tablets. It seems this year a heavy focus on the Internet of Things—with sensor-based devices that feed information to a computer over the Internet, further emphasizing the Any to Any problem, which changes the security paradigm. Any user on any device increasingly going over any type of connection, to any application, that could be running in any data center and on any cloud. Regardless of how or where our users are connecting, we have to provide the right levels of inspection and protection against malicious intruders who may steal sensitive data or disrupt business. Let’s start to think and be prepared for what organizations may see coming on their networks and what the security implications may be for next year.

Happy 2014!

Tags: , , , ,

17 Signs You Could Be A CiscoChampion for Enterprise Networks

Cisco Champions CVD Beach ReadingIf you see yourself in any of the following, you might be a Cisco Champion for Enterprise Networks.

  1. You’ve named your pet cat “6k”
  2. News of a new .11ac AP excites you
  3. CVDs are beach reading
  4. You can name more than 4 services offered on an ISR
  5. You know why there aren’t IOS ver. 13 nor 14
  6. Your home network scares some visitors. Others want to borrow it for study
  7. Downgrading someone’s QoS (allegedly) is your idea of a practical joke
  8. Your CCIE number is in your twitter profile Read More »

Tags: , , , , , , , ,

Mobility and BYOD That’s Right for Your Midsize IT

Employee are now unchained from their desks; mobility frees the ability to work anyplace, anytime, and from any device. This is revolutionizing the type of productivity and efficiency businesses see from their workforce- large, medium, or small.  While realizing business efficiency and growth, midmarket IT is struggling to balance objectives (make the network for you) and challenges (limited resources).

Midmarket IT Objectives

Leverage the network as a strategic asset

To increase employee productivity and gain competitive advantage;

Better serving customers,

Thus realizing overall growth

Midmarket IT Challenges with Mobility and BYOD

The advent of mobility and BYOD, while unleashing unprecedented levels of communication and collaboration, brings challenges to IT. Mobility enables BYOD. BYOD enables multiple types of employees, logging in from multiple types of devices, from multiple locations. Users are demanding access to the Internet and applications wherever and whenever they want.  Chaos? Anyone reading this won’t need the laundry list of concerns. It’s there.

Read More »

Tags: , , , , , , , , , ,

Summary: An Innovative Infrastructure to Capture the Value of the Internet of Everything

The Internet of Everything (IoE) is no longer a prediction. It is reality. As I think about the infrastructure needed to truly capture its value, I immediately think the network needs to be:

  • Agile
  • Intelligent
  • Secure

Why are these qualities a necessity for a thriving programmable infrastructure? Simply, it will allow enterprises to be ready for today’s business needs and tomorrow’s new business models.

Business Insights 12 11 13

Organizations must be able to quickly, intelligently and securely leverage their infrastructure to keep pace with business transformation driven by emerging cloud and mobile technology.

Today’s world is dominated by what Gartner Vice President David Cearley calls the “four powerful forces: social, mobile, cloud and information.” An infrastructure must increasingly demonstrate it can add value to the business, by rapidly and securely rolling out new services, apps and capabilities in a connected world.

Read the full article:  An Innovative Infrastructure to Capture the Value of the Internet of Everything

Tags: , , , , , , , , , , ,

An Innovative Infrastructure to Capture the Value of the Internet of Everything

As the saying goes, the constants in life are death and taxes. We all know there are more than those two, including change and its counterpart, disruption. Business success will result from responsiveness and adaptation that will happen at a rate and with intelligence that we’ve only begun to get our heads around.  And, most CIOs I speak with are asking about how they can adapt and scale their infrastructure to be prepared as the Internet of Things evolves into the Internet of Everything.

Learn how your infrastructure can be intelligent, flexible and secure during constant business transformation. Click on each interactive tile to discover relevant facts.

Learn how your infrastructure can be intelligent, flexible and secure during constant business transformation. Click on each interactive tile to discover relevant facts.

This change brings big implications for IT. The role of IT is changing, in the face of cloud and mobile apps, and the growing understanding that every company is a technology company. From the consumerization of IT to what Gartner Vice President David Cearley calls the “four powerful forces: social, mobile, cloud and information,” IT must increasingly demonstrate it can add value to the business, by rapidly and securely rolling out new services, apps and capabilities in a connected world.

Read More »

Tags: , , , , , , , , , , , ,