Cisco Blogs


Cisco Blog > SP360: Service Provider

BYOD: What Businesses Need

By Ross Fujii, CTO of Cisco Network Management Technology Group (NMTG)

Bring Own Your Device (BYOD) in the context of the business world reflects the fact that many consumers bring their work home with them.  Specifically, they connect devices they have received as part of their job – laptops, smartphones, and tablets – to the home network and use them as they would at the workplace.

While the added productivity of BYOD and working at home is attractive to businesses, the risk of exposure is not.  Laptops, for example, can store or access sensitive data like financial information or critical trade secrets that need to be protected.  In some cases, such as personal or health data, the law requires that this information must be secured.

The reality is that it is not always possible to ensure that a device is secure.  As a consequence, Read More »

Tags: , , , , , , , , , ,

A spot of Wi-Fi, dear?

Connectivity Underground!

After just one day in London, I began to take the Tube system of transportation for granted. It’s just so easy to zip from one side of town to the other – no traffic, continuous service and more destinations than any person can hit during one vacation.

I felt savvy and confident using the Tube given my previous experience commuting on the NYC subway for 7 years. But I had a moment of panic when I remembered that I was without an international data plan; could I really survive 5 days without my “data”? Not being able to make calls or to send or receive texts was scary enough, but finding my way around a new city without a mapping app in my hand? Unimaginable! Turns out the Tube was the solution to my problem. Wi-Fi was readily available, for FREE, in Tube stations around the city. Since I was constantly out and on the go, I actually found myself relying on my underground travel time to connect with friends, make plans, post to Twitter and Facebook and even buy a new book for my e-reader! Read More »

Tags: , , , , ,

BYOD: What Consumers Want

By Ross Fujii, CTO of Cisco Network Management Technology Group (NMTG)

Before exploring how service providers can capitalize upon the opportunities that Bring Your Own Device (BYOD) offers, it is critical to understand what consumers actually need and want from their home network.  A few usage scenarios will illustrate the key characteristics of the next-generation connected home:

  • You’re watching the news on your smartphone as you take a walk around the neighborhood.  When you get home, you pause the video stream and resume it on your IPTV in the comfort of your living room couch.
  • You’ve heard about a new TV show you want to check out.  You have no idea whether Read More »

Tags: , , , , , , , , , ,

BYOD and Government Certifications

It’s summer and my kids have been testing for swim certification so they can swim in the big pool. When they complain about the swim exam, I assure them that it’s not only to be safe, but also  to validate that they have reached a recognized standard of performance.  Similarly, governments worldwide require proof of certification before allowing equipment, including commercial wireless devices and technology, to be deployed on their networks.

With the growing trend towards BYOD, countless organizations must strategize how to best protect data in-transit across wireless networks, while optimizing the benefits of a mobile workforce.  For government and public sector organizations, it is especially imperative that the solutions employed to mitigate risks associated with BYOD and WLAN are compliant with the highest standards and certifications.

Certification is an ongoing effort in a changing landscape.  Cisco maintains an active product certification program for government customers by staying as current as possible with certifications to enable our customers to confidently deploy our solution.  As of July 26, 2012, we are proud to announce the Common Criteria Certification award to one of our recent 7.0 software releases.

Read More »

Tags: , , , , , , , , , ,

Work Your Way, Securely

August 2, 2012 at 11:17 am PST

Hear how financial innovator Diebold gains visibility and control of the 87,000 devices on their network. David Kennedy, former Chief Security Officer at Diebold recognizes there is no stopping new mobile devices and sets course to secure the organization while ensuring the business may continue to generate revenue. Workers want to work their way securely and prefer that the security is transparent so that they have the optimal experience. He speaks to the unique granularity that the Cisco Identity Services Engine (ISE) offers to segment access by user, device, access method, posture, and time. So that engineers may have access to their codebase while marketing professionals like me have no access from my new iPad:

Read More »

Tags: , , , ,