Cisco Blogs


Cisco Blog > Security

Work Your Way, Securely

August 2, 2012 at 11:17 am PST

Hear how financial innovator Diebold gains visibility and control of the 87,000 devices on their network. David Kennedy, former Chief Security Officer at Diebold recognizes there is no stopping new mobile devices and sets course to secure the organization while ensuring the business may continue to generate revenue. Workers want to work their way securely and prefer that the security is transparent so that they have the optimal experience. He speaks to the unique granularity that the Cisco Identity Services Engine (ISE) offers to segment access by user, device, access method, posture, and time. So that engineers may have access to their codebase while marketing professionals like me have no access from my new iPad:

Read More »

Tags: , , , ,

BYOD: The Changing Topology of the Connected Home Network

By Ross Fujii, CTO of Cisco Network Management Technology Group (NMTG)

BYOD – Bring Your Own Device – is a catch-phrase capturing the idea that consumers are bringing more and more devices into the connected home network.  It is no longer just the early adopters who have non-PC devices they want to use while at home.  There has been a literal explosion of electronic devices that consumers want to share content and data across – smartphones, tablets, IPTVs, network-attached storage (NAS), and even game consoles.  Each of these devices generates different types of traffic and consumes content in completely different ways.  The number of new usage scenarios to support is daunting.

BYOD also refers to the idea that people want to be able to bring and use their own devices in other people’s homes.  If you want to look something up on the Internet, for example, you don’t want to have to borrow your friend’s phone to do so.  You want to do it on your own device.  Similarly, today’s Read More »

Tags: , , , , , , , , , ,

BYOD on a University Campus: A Student’s Perspective

There is a new generation of college students out there, I would know as I recently was one of them.  Information being at your fingertips is no longer a luxury, it is a necessity.  Professors’ expectations of their students have increased dramatically due to the wealth of information on mobile devices.  Every class I attended leveraged some form of wireless access to the web.  Instant message in response to real-time questions and online submissions are just two of many examples of how network access has been integrated into the education system.  Professors would consistently use online tools such as online drop boxes for projects and web conferencing tools.  According to MarketWire 92% of college students feel a laptop is a necessity, this indicates that the requirement of mobile access at a university is a given and the college experience is defined by the ease of that access. 

Professors are on tight schedules and are generally available only at certain times of the day.  Imagine- wanting to contact a professor during open hours only to fall short because your laptop had difficulty getting any kind of connection.  I remember the frustrations of wanting to revisit PowerPoint presentations on a class website in the library, only to realize that I was sitting by the one window notorious for being a wireless dead zone.  Dorms were infamous for spotty coverage.  Having the dorm room located closest to the access point for best access was purely by luck of the draw.  I was not so lucky.  In my dorm, you would not get any wireless access unless you were sitting right next to the hallway.  That’s why I am especially envious of the students of Colorado University, whose alma mater upgraded to enterprise-class coverage. 

Read More »

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , ,

Quintiles Embraced VDI for Next-Gen Work Space

Change. It’s part of how we work, live, and play. Change is inevitable and often feared rather than embraced. However, change could be a catalyst for innovation, a new way of doing things faster and more efficiently. It allows companies to capitalize on opportunities, creating strategic long-term value while also meeting immediate operational needs.

The market is changing and so is the IT landscape. By 2014, more than 70 million virtual desktops will be connected and 90% of organizations will allow work applications on personal devices (Gartner, 2010). Similarly, by 2015, 1.5 billion mobile devices will connect to the network (Gartner, 2011). These transitions add intense burden to the network, from manageability to security, availability, and scalability.  IT leadership often turns to stopgap measures such as getting faster WAN links to handle increased traffic. But that doesn’t solve everything. Organizations that want to propel forward (i.e. be competitive) must change their focus – that is focus not only on bandwidth management, features, and bytes, but also on business agility – giving themselves room to grow. One pharmaceutical services company did that with Cisco Borderless Networks infrastructure.  Read More »

Tags: , , , , , ,

The new manufacturing workforce enabled by Cisco Unified Access

July 31, 2012 at 4:34 am PST

My eldest nephew is a recent college graduate.  He lives in Boston and walks to work, which is less than 2 miles from his apartment.  When I was his age, I commuted fifty miles in bumper-to-bumper traffic to get to work (uphill, both ways)!

Young, skilled workers who want to live, work and socialize locally are pushing companies to locate in cities.  Many employers are accommodating the hiring demands of the new workforce, as a means to recruit and retain new talent.

An estimated 10 million manufacturing jobs are currently unfilled due to a growing skills gap.  As the talent pool shrinks, companies are paying close attention to what the next generation of skilled workers wants – all with the end goal of employing, retaining and keeping workers away from the competition.

Watch the video that I refer to later in the blog

An undeniable truth is that these young workers, and most of their not-so-young co-workers, want the freedom to use their own personal smartphones and tablets at work. And more than ever, they want to use them from anywhere, even when they’re on the move. This mobile BYOD desire is causing an avalanche of new devices (15 billion by 2015), applications and cloud-based services.

Business and IT leaders are paying attention.  A May 2012 Cisco IBSG Horizons Study reveals that IT is saying yes to BYOD. A whopping 95% of respondents say their organizations permit employee-owned devices in some way, shape or form in the workplace.  Have a look at Peter Granger’s blog to learn about how manufacturers are implementing BYOD.

Working according to our own terms does present a variety of new business and IT infrastructure challenges. And thanks to Cisco Unified Access, employers can safely accommodate the demands of the new workforce, and enhance their own business productivity in the process. 

The new workforce’s insistence on working their way may not only change the way we do business; it just might ease that bumper-to-bumper rush hour traffic!

Tags: , , , , ,