It’s no longer a question of whether mobility best practices and policies are required, it’s a matter of when your strategy will get ahead of the unstoppable trend. Business and IT leaders alike are not just witnessing the movement of everything mobile, but guilty themselves: who isn’t on their devices for both work and play anymore?
User experience, performance, security and management are key red flags that shoot up when we think about mobile. Getting these four totems right will help organizations keep employees or customers happy and productive, while protecting the business. This is no piece of cake: mobility is a journey and you need a strategy.
Thought leaders and innovators across industries are converging on #SuperMobility Mobile Con this week in Vegas to discuss best practices and ways for organizations to tackle these key issues. We’ll be there too to discuss how to move beyond BYOD and develop an enterprise mobility strategy.
Session: Embark on Your Employee and Customer Mobility Journey
Time: Sep. 09, 2014 from 3:30 PM to 4:29 PM
Location: Sands Expo − MobileCON Show Floor, Stage 3 Read More »
Tags: #CTIA2014, #supermobility, App, application, byod, Cisco, client, cloud, collaboration, consumer, customer, device, Enterprise, management, mobile, mobilecon, mobility, network, organization, secure, security, services, solution, strategy, user experience, vegas, wi-fi, wifi, wireless
As a business or technical leader, you know you need to protect your company in a rapidly evolving mobile ecosystem. However, threats are not always obvious. As malware and attacks become more sophisticated over time, business decision makers must work with technical decision makers to navigate security threats in a mobile world.
This blog series, authored by Kathy Trahan, will explore the topic of enterprise mobility security from a situational level and provide insight into what leaders can do now to mitigate risk. To read the first post focused on securing device freedom, click here. The second post, available here, focused on the risks that come with mobile connections. Kathy’s third post outlined three top considerations leaders must consider when examining their current mobile data security plan. The fourth post in this series highlights how security compliance is necessary for real-time mobile data access. – Bret Hartman, Chief Technology Officer (CTO) for Cisco’s Security Technology Group
Many of us have experienced that panicked “oh no!” moment when we’ve misplaced a mobile device or worse, found out it was stolen. The stakes are raised even higher when a lost or stolen device is company issued, or a personal device an employee uses for business purposes and contains sensitive data.
According to a recent report, more than 3.1 million smart phones were stolen just in America last year alone. This same report revealed that 34% of people took no security measures at all to protect sensitive information – not even a simple four-digit password. 51% of end users use their smartphone to perform daily business activities.
Read More »
Tags: byod, Cisco, data security, future of mobility, mobility, security
Forget the best of both worlds. Ritchie Bros Auctioneers have found the best of three worlds with their network. This midsize company enables fast, secure bidding for customers, provides hassle-free mobile access for employees, and detailed network reports with no effort for IT.
Ritchie Bros. Auctioneers is the world’s largest auctioneer of heavy equipment and trucks. They sell billions of dollars of unused and used equipment at hundreds of unreserved public auctions each year. What’s even more impressive is that they are able to do this with only 1300 employees worldwide.
Auctions are very time sensitive and require a synchronized effort. This leaves little room for errors and interruptions. Read More »
Tags: byod, Cisco ISR G2, Cisco Unified Access, Connected Constuction, construction, EN, IWAN, midmarket, midsize, mobile, Mobile Auctions, Mobile Bidding, mobility, network, Online bidding, Public Auctions, security, small business, smb, UA, wifi, wireless
A few months ago we had a webcast on the Catalyst 3650 and it was so popular, there were so many questions, we thought we’d host another one! This webcast is being held on August 19th at 10am PT and you can register here!
Topics to be discussed include:
- Top of mind IT issues
- The Catalyst 3650 Series Switch features & innovations
- Model selection recommendations
- Campus and branch office deployment considerations
- Live Q&A
Why should you attend?
Managing your network today has become more complicated than ever. In addition to the challenges of supporting an increasingly mobile workforce and a plethora of BYOD users, you are being asked to reduce IT complexity and cost and strengthen security.
Read More »
Tags: 11ac, byod, catalyst, Catalyst 3650, Cisco Learning Network, Cisco Switch, FNF, Get Answers, SDN
Location-based services have been getting a lot of attention lately and people are increasingly curious about how Wi-Fi and beacons play together in the hot space that is indoor location technology. In my last blog I reviewed how beacons work and how to differentiate when to use Wi-Fi and beacons. There’ve been some great questions about beacon technology and how it complements Cisco’s location-based Connected Mobile Experiences (CMX) solution, so I want to follow up on these topics with everyone.
What types of beacons are there?
Generally, there are two different classes of beacons: transmit only and backhaul enabled.
Transmit only beacons are exactly as they sound – they simply transmit information to anyone that is capable of hearing (bluetooth enabled smartphones). They do not receive or pass any data or information upstream.
Apple’s iBeacon is the best example of this type of BLE beacon. You can think of them like the navigational beacons used by airplanes when on approach to major airports. The beacon doesn’t even know the plane is there, but the plane is aware of the beacon and knows where the beacon is allowing it to take the correct action. Same is true for smartphones and transmit only beacons like iBeacon – the intelligence is located in the mobile application which must recognize the beacon and take appropriate action.
Backhaul enabled beacons generally include a Wi-Fi chipset for either management or data capabilities. Some backhaul enabled beacons are USB enabled and take advantage of whatever connectivity exists within the PC they are connected. Read More »
Tags: access, analytics, Apple, beacon, BLE, bluetooth, byod, Cisco, cmx, consumer, customer, deployment, device, dimension, Enterprise, GPS, granular, Guest, healthcare, ibeacon, indoor, Indoor location, IT, lbs, line-of-business, location, location based services, marketing, mobility, mse, network, operation, productive, productivity, proximity, retail, sales, tag, technology, track, tracking, wi-fi, wifi, wireless, wlan