As a business or technical leader, you know you need to protect your company in a rapidly evolving mobile ecosystem. However, threats are not always obvious. As malware and attacks become more sophisticated over time, business decision makers must work with technical decision makers to navigate security threats in a mobile world.
This blog series, authored by Kathy Trahan, will explore the topic of enterprise mobility security from a situational level and provide insight into what leaders can do now to mitigate risk. To read the first post focused on securing device freedom, click here. The second post, available here, focused on the risks that come with mobile connections. – Bret Hartman, Chief Technology Officer (CTO) for Cisco’s Security Technology Group
The Cisco Visual Networking Index revealed an obvious truth that none of us can deny—mobile data traffic is on the rise and shows no signs of stopping:
- By 2018, over half of all devices connected to the mobile network will be “smart” devices
- Tablets will exceed 15 percent of global mobile data traffic by 2016
- By the end of this year, the number of mobile-connected devices will exceed the number of people on earth, and by 2018, there will be nearly 1.4 mobile devices per capita
With the explosion in the number of smart mobile devices and employees increasingly taking advantage of BYOD, securing company and personal data in a world where the mobile endpoint is a new perimeter presents technical and legal challenges for organizational leaders.
What are some of the most prevailing challenges? The personal use of company-owned devices happens more frequently than IT may realize and a complex legal environment can leave both employees and IT confused on how personal privacy is being protected. It is important for human resources to weigh in here as well.
Read More »
Tags: byod, Cisco, data security, future of mobility, malware, mobility, security, vni
In just two years, indoor location technology has taken off and attracted a lot of buzz across industries, from retailers to healthcare. But it’s no longer a conversation about just Wi-Fi – the introduction of beacon devices, including iBeacon, has added a new dimension to location technology for IT and their line of business counterparts to grapple with on how to leverage it to better reach their customer base.
Some customers have been asking about beacon technology and how it fits in with Wi-Fi, so let’s start from the beginning:
How do beacons work?
Beacons are sensors that send out Bluetooth low energy (BLE) tracking tags. These sensors can be placed around a venue, such as a store, and a mobile device can pick up the BLE signal and determine that it is in close proximity. When a mobile app is built off of this technology, it can be used in interesting ways to interact with the end user, such as notifying a customer of a promotion for an item they are close to.
I’m having trouble differentiating Wi-Fi and beacons. What do I need to know? Read More »
Tags: access, analytics, Apple, beacon, BLE, bluetooth, byod, Cisco, cmx, consumer, customer, deployment, device, dimension, Enterprise, GPS, granular, Guest, healthcare, ibeacon, indoor, Indoor location, IT, lbs, line-of-business, location, location based services, marketing, mobility, mobility services engine, mse, network, operation, productive, productivity, proximity, retail, sales, tag, technology, track, tracking, wi-fi, wifi, wireless, wlan
ISTE 2014 marks the launch of summertime for many educators as they come together to connect and share ideas about technology and innovation. Unsurprisingly, the theme of “connectedness” continues with this year’s show in Atlanta. The ability for schools to connect to the Internet and help make access to technology ubiquitous is changing learning in ways we probably never imagined: students can now take virtual field trips; they can access almost any information any time with the touch of a button, and traditional textbooks are going digital. Rapid advances in technology are accelerating change.
In 2015, 25 billion devices will be connected to the Internet. More things are connected to the Internet than there are people in the world. By 2020, that number will double to 50 billion devices, and each person will have an average 6.58 devices. We know that Internet of Things (IoT) connections will grow from two billion to six billion in the next five years, producing an enormous amount of information. Read More »
Tags: byod, Cisco Education, edtech, education, IoE, ISTE, ISTE2014, IVC, mlearning, renee patton, VTC
We’ve been hearing from some of our customers that they are interested in using Cisco Meraki in their branches alongside their Cisco infrastructure in their main offices, but were worried about having to deal with too many segregated policy management systems.
Good news: Interoperability between Cisco Meraki and ISE is here. Administrators can now define a single user access policy across on-premise and cloud-managed networks.With this interoperability, Cisco infrastructure customers can now deploy Cisco Meraki in their branches in the same network as other Cisco equipment, with all devices across the network managed under ISE for unified access policy management.
Read more about the Cisco Meraki and ISE interoperability in the blog post: Got ISE?
To get a free Meraki wireless access point and learn more about the solution, join one of our online webinars. See the complete schedule and choose from a range of webinars featuring Meraki customers, product and solution overviews, and topics like BYOD.
Tags: access, branch, byod, Cisco, cloud-managed, customer, interoperability, interoperable, ISE, main office, Manage, management, meraki, network, on-premise, policy, product, security, segregated policy management, single user, solution, webinar, wi-fi, wired, wireless
Technische Universität Darmstadt, usually known as TU Darmstadt is a research university based in Germany. It was founded in 1877 and over the last 137 years has grown to be among the largest and most prestigious public universities in Germany serving over 25,000 students per year. It is the alma-mater to many world-wide leaders from Nobel prize winners, a CEO of a fortune 500 company, a president of a country and multiple World Robocup champions.
No wonder, they have a reference from Albert Einstein!
In 2009 TU Darmstadt embraced BYOD with the 5508 Series Controller managing the 1140 802.11n Access Points. Recently we talked to Thomas Vogel, the Head of Network Group and Andreas Liebe, the Network Services Manager who have over 15 years of experience managing WLAN environments. In this blog, we will describe some of the details of WLAN deployments using the 3850 Series Switch and the 5760 Series Wireless LAN Controller to address the new requirements in the school environment. Read More »
Tags: 3850, 5760, 802.11, 802.11ac, 802.11n, access, access point, account, AP, App, application, authorized, AVC, bring your own device, buildings, byod, Cisco, client, controller, Converged Access, darmstadt, deployment, devices, employee, encrypted traffic, environment, frankfurt, Germany, infrastructure, IPv6, LAN, management, network, policy, prime, Prime Infrastructure, requirements, research, school, security, services, standard, switch, technische, technology, trend, TU, TUD, unified access, Universität, university, user, visualize, wi-fi, wifi, wired, wireless, wlan