As the Cisco 2015 Annual Security Report shows, current security approaches aren’t sufficient. Attackers are shifting methods and becoming more sophisticated in their approaches, users are unwittingly complicit enablers, and defenders struggle to keep up with all of these things. It is time for defenders to take a different approach to security that not only outwits attackers but also makes security a competitive advantage that enables business growth.
By taking a threat-centric and operational approach to security, organizations can reduce complexity and fragmentation, while providing superior visibility, continuous control, and advanced threat protection across the extended network and the entire attack continuum.
Using Cisco technology, this approach is enabled by broad visibility for superior intelligence across the extended network, where all the solutions a customer deploys communicate with each other. Organizations using siloed solutions will have holes in their security. Siloed solutions do not provide full protection since they do not communicate with one another, thus leaving security gaps and the inability to create actionable intelligence.
Cisco can provide a holistic solution to this problem by reducing the attack surface and extending protection across the network – before, during and after attacks.
Read More »
Tags: 2015 annual security report, Big Data, byod, Identity Services Engine, ISE, Managed Threat Defense, security
Whether you are among the 8,000 attendees participating at Cisco Live Milan in-person or among our many virtual attendees catching the live web broadcast, you’ll find lots to help you with your mobility-related projects.
Read More »
Tags: #CLEUR, 11ac, 802.11ac, byod, Cisco CMX, cisco live, innovation, meraki, Meraki Challenge, milan, Milano, mobile, mobility, technology, wi-fi, wlan, workspace
Cisco Identity Services Engine (ISE) is commonly associated with use as a network access policy, BYOD and AAA platform. But to do its job in network policy, ISE collects a great breadth of telemetry about network users and devices. Whether a device is trying to access the network or is already connected, ISE knows specifics about:
- What the device type is (e.g., iPad Air 2 running iOS 8.1.2)
- How it is connected to the network (e.g., enterprise Wi-Fi)
- From where (e.g., access point in “California/SanDiego/Building 2/Floor 3/South”)
- Security and compliance posture of the device (e.g., Antimalware operating and up to date? PIN lock configured?)
- Who the user is on the device…or if it even has a user (e.g., printer)
- What policy and AD/LDAP group the user belongs to (e.g., “IT Admin” authorization group)
- Related session IP address and MAC address
While ISE primarily uses all this telemetry to establish network policies, it also shares it for use by other IT platforms. By doing so, ISE helps these platforms become more identity and device aware and thus more effective in a variety of ways. And this is where Splunk comes in.
Read More »
Tags: byod, Cisco ISE, Identity Services Engine, Network Access Policy, Splunk
Bring Your Own Device (BYOD) technology promises many benefits to organizations. For example, increased productivity results when users can access data with any device, anywhere, anytime. By both simplifying and automating security and policy management, IT management costs can also be reduced. There are equipment savings as well, since organizations can leverage the use of personal electronics that their employees already own.
There’s a lot to enabling BYOD. IT can’t afford to manage every single device that wants to join the network. There are also security issues, such as preventing stolen mobile devices from providing unrestricted access to sensitive data.
Cisco has worked with OneNeck IT Solutions to provide a comprehensive BYOD solution for businesses and other organizations. OneNeck IT Solutions is a Cisco Gold Partner. They have advanced specializations in mobility and security and are leading the industry in helping companies successfully embrace BYOD technology.
The OneNeck BYOD solution includes:
- Identity Services Engine: Unifies policy-based service enablement that ensures corporate and regulatory compliance of all devices on your network.
- Cisco AnyConnect Secure Mobility Client: Simplifies the VPN experience with enhanced remote access technology.
- Intelligent Network infrastructure: Security is embedded into wired, wireless, and VPN access points to provide greater visibility and enforcement.
- Mobile Device Management: Seamlessly integrates your BYOD strategy with solutions from leading market providers.
- Virtual Desktops: Provides secure access to desktops from any device.
OneNeck also offers many advanced features to assure the security of both devices and the network. You can read more about these features in this blog from OneNeck. To learn more about Cisco’s BYOD solutions, visit http://www.cisco.com/web/solutions/trends/byod_smart_solution/index.html.
Tags: byod, BYOD (Bring Your Own Device), Cisco Powered, OneNeck
Your mobile strategy needs to consider the user’s point of view and the highly dynamic nature of the mobile threat landscape. Weighing the threat risk includes evaluating the cost of insecure mobile devices.
User Point of View
The Cisco 2014 Connected World Technology Research tracked the users’ outlooks on the evolving work environment. Being mobile, off premise with your device was well noted.
• Most believe a flexible, mobile and remote work model is competitive.
• Over 25% work from organizations that allow working from home (WFH).
• Over 50% consider themselves available 24 hours 7 days.
• Most believe the most connected device for work will be the smartphone in 2020.
The trend for mobile remote work environments cannot be disputed but the mobile device threat vector expands to a broader range of access points. This puts your corporate resources at risk of being corrupted or stolen. Let’s consider the cost of an insecure mobile environment.
Read More »
Tags: byod, connected employee, mobility, security, UX