Often we focus on the challenges associated with IT with little consideration of the end user viewpoint. In Cisco’s Work Your Way Global Study, completed in January of 2013, we polled over 1300 IT professionals and business-focused end users around the globe to investigate how BYOD is not only affecting IT, but how the challenges directly impact the end user experience. We were curious to compare and contrast the different viewpoints to understand if the difficulties IT was facing had an impact on how end users get their devices on the network, access business applications and perform day-to-day activities on the move. Based on these results we created an Infographic that talks about the challenges and provides key insight to what the results mean. Read More »
We’ve been hearing a lot about the transition to the Internet of Everything, and the billions of new devices that will be coming online in the next few years. But the Internet of Everything is not only about connected things, it’s about the amazing things that will happen when you connect people, process, and data with those things. And in today’s fast-moving world, these new connections must be mobile, adapting to let you work or communicate the way you choose—anywhere, without compromise.
When you support mobility with an intelligent network, the result is much more than the sum of its parts. As people, processes, data and things all join together on the Internet, the intelligent network listens, learns, and can take action to make connections more relevant and valuable.
We’re witnessing an increasingly mobile Internet of Everything taking shape around us today. For example, the Palomar Health Medical Center in San Diego is connecting its healthcare environment over a wireless network to provide a better experience for patients. So doctors can securely pull up a patient’s health record on a smart phone or tablet anywhere at the medical center. Or receive a wireless alert the moment a lab test is ready. Next generation programs include mobile robots that let patients roam around the hospital and videoconference with families and caregivers.
The possibilities are endless. How could infinite connections and an intelligent, mobile network help you save your employees time? Make their jobs easier? Or improve the way your kids learn? Learn more at The Platform blog.
We’ve been hearing a lot about the transition to the Internet of Everything, and the billions of new devices that will be coming online in the next few years. It’s clear that the network isn’t just for PCs, smartphones, and tablets anymore. We’re entering an age where home appliances, disposable consumer gadgets, and even buildings will be on the net and sharing information.
But the Internet of Everything is not only about connected things, it’s about the amazing things that will happen when you connect people, process and data with those things —and change the way we work, live, play, and learn. And in today’s fast-moving world, these new connections must be mobile.
Here are tips to help you adopt and support mobility for your small and midsized business.
The new BYOD trend has changed both employee and customer expectations. The future is in your hands now! Are you reading this on your smartphone?
When you consider this new way we all live—the mobile world, as a small or medium sized business why would you want to ignore this BYOD trend? As Linda Beaton, marketing manager for Cisco points out in her recent blog, this BYOD trend encourages business growth and has security challenges. The upside is that companies that choose to embrace mobility reap a lot of benefits, including attracting more customers and serving them better. According to the Cisco ISBG Horizons Research, mobility improves employee productivity and ultimately can provide you with a competitive advantage.
In addition, when employees get to choose how, where, and with which tools they work, there is a 16 percent increase in job satisfaction. Cost savings are a benefit, too! Companies save approximately 15 percent when employees pay for all or part of their own devices and mobile data plans. And what company wouldn’t want to save money?You many ask: so how can I prepare my business for this new growing trend? It’s easy. By taking into account the following tips, you can get your business ready to adopt mobility and start reaping the benefits today.
Network infrastructure: According to the Cisco Connected World Technology Report, 40 percent surveyed expect to be able to access their company network from their personal mobile device. The inability to access the network impedes productivity—up to six hours per week. To support employees with mobile devices, you need a robust network, fast access and a lot of bandwidth, all wireless! You may also need to invest in network improvements to support advanced technologies to improve communication and collaboration among employees, partners and customers all seamlessly—and Cisco’s unified communications is the key.
Security: You may think that your anti-virus is the only protection you need. But guess what? In a recent Dark Reading article it points out, even when 40 antivirus products were tested with the most common viruses today they detected less than 5 percent of those threats. A breach in your company business data can result not only in financial loss, but also lost customer and business downtime. In fact, the new Cisco ISA500 is a comprehensive all-in one solution that performs like a router, firewall, and unified threat management device.
Protecting the privacy of your data from outside threats requires a three-pronged approach:
- First, put infrastructure precautions in place to protect your network from malicious activity, such as: firewalls, anti-virus and anti-spam software, and intrusion prevention systems (IPS).
- Second, you need a VPN to ensure secure access and transmission of your data from mobile employees.
- Third, you need an acceptable use policy that includes guidelines for mobile device usage. The AUP should outline your expectations for these devices, such as who has rights to the data on them, users’ responsibilities, and security procedures.
Support: So, when employees use their mobile devices for work, how do you provide them with support? For example, if your employees use their smartphones or tablets for work and encounter a technical issue, who do they call? Time spent dealing with technical issues is time that your employees aren’t spending on company business.
To address this, consider purchasing a service contract. A service support plan gives you access to expert technical support engineers who can quickly resolve issues, keeping employees productive. Perhaps the biggest hurdle for small and medium-sized businesses is where to start when it comes to mobility and BYOD. A Cisco Partner can help plan, implement, and support a secure, scalable mobile experience for you and your employees. So what are you waiting for? Find a partner today!
This is a great topic, right? Want more? Check out these posts:
- Smartphones are business tools, too
- Protect mobile devices, protect your network
- Help keep company data safe on employees’ personal devices
Ask the DC Security Expert: Three things to know about data center firewall application visibility and control
I recently interviewed Mike Geller, a 15-year Cisco veteran and a security architect, who focuses on securing infrastructure, devices, and services delivered by service and cloud providers to governments, enterprises, and end users. I asked Mike to discuss three key feature sets that firewalls should have today to enable users to securely access the applications in the data center. This topic is very timely as application control is quite the “in vogue” topic.
#1: Network Integration
Mike takes the position that security is an attribute of the network versus a siloed, bolt-on element. With applications delivered from a combination of the cloud, service provider or hosted data center (the on premise data center at the enterprise or the mobile endpoint), security is pervasive across all domains. Integrating security into the network fabric that is used to deliver key business applications is the only way to offer services at the size and scale of today and tomorrow. How do you approach full integration of security? Let’s break it down. Read More »