Whether you are among the 8,000 attendees participating at Cisco Live Milan in-person or among our many virtual attendees catching the live web broadcast, you’ll find lots to help you with your mobility-related projects.
Cisco Identity Services Engine (ISE) is commonly associated with use as a network access policy, BYOD and AAA platform. But to do its job in network policy, ISE collects a great breadth of telemetry about network users and devices. Whether a device is trying to access the network or is already connected, ISE knows specifics about:
- What the device type is (e.g., iPad Air 2 running iOS 8.1.2)
- How it is connected to the network (e.g., enterprise Wi-Fi)
- From where (e.g., access point in “California/SanDiego/Building 2/Floor 3/South”)
- Security and compliance posture of the device (e.g., Antimalware operating and up to date? PIN lock configured?)
- Who the user is on the device…or if it even has a user (e.g., printer)
- What policy and AD/LDAP group the user belongs to (e.g., “IT Admin” authorization group)
- Related session IP address and MAC address
While ISE primarily uses all this telemetry to establish network policies, it also shares it for use by other IT platforms. By doing so, ISE helps these platforms become more identity and device aware and thus more effective in a variety of ways. And this is where Splunk comes in.
Bring Your Own Device (BYOD) technology promises many benefits to organizations. For example, increased productivity results when users can access data with any device, anywhere, anytime. By both simplifying and automating security and policy management, IT management costs can also be reduced. There are equipment savings as well, since organizations can leverage the use of personal electronics that their employees already own.
There’s a lot to enabling BYOD. IT can’t afford to manage every single device that wants to join the network. There are also security issues, such as preventing stolen mobile devices from providing unrestricted access to sensitive data.
Cisco has worked with OneNeck IT Solutions to provide a comprehensive BYOD solution for businesses and other organizations. OneNeck IT Solutions is a Cisco Gold Partner. They have advanced specializations in mobility and security and are leading the industry in helping companies successfully embrace BYOD technology.
The OneNeck BYOD solution includes:
- Identity Services Engine: Unifies policy-based service enablement that ensures corporate and regulatory compliance of all devices on your network.
- Cisco AnyConnect Secure Mobility Client: Simplifies the VPN experience with enhanced remote access technology.
- Intelligent Network infrastructure: Security is embedded into wired, wireless, and VPN access points to provide greater visibility and enforcement.
- Mobile Device Management: Seamlessly integrates your BYOD strategy with solutions from leading market providers.
- Virtual Desktops: Provides secure access to desktops from any device.
OneNeck also offers many advanced features to assure the security of both devices and the network. You can read more about these features in this blog from OneNeck. To learn more about Cisco’s BYOD solutions, visit http://www.cisco.com/web/solutions/trends/byod_smart_solution/index.html.
Your mobile strategy needs to consider the user’s point of view and the highly dynamic nature of the mobile threat landscape. Weighing the threat risk includes evaluating the cost of insecure mobile devices.
User Point of View
The Cisco 2014 Connected World Technology Research tracked the users’ outlooks on the evolving work environment. Being mobile, off premise with your device was well noted.
• Most believe a flexible, mobile and remote work model is competitive.
• Over 25% work from organizations that allow working from home (WFH).
• Over 50% consider themselves available 24 hours 7 days.
• Most believe the most connected device for work will be the smartphone in 2020.
The trend for mobile remote work environments cannot be disputed but the mobile device threat vector expands to a broader range of access points. This puts your corporate resources at risk of being corrupted or stolen. Let’s consider the cost of an insecure mobile environment.
For example, did you know that the majority of today’s professionals would relinquish their television before they let you take away their smartphone? Or that given a choice between Internet access and sense of smell, an incredible 43% would hang on to the Internet. Now there’s the true meaning of a 6th sense.
These are just a couple of the provoking (and some may say disturbing) findings.