Cisco Blogs


Cisco Blog > Cisco Interaction Network

Where do you do your best work?

May 21, 2013 at 9:07 am PST

8766409457_93b8f32beb_o.png

Most of us have the ability to work in different places these days. I am personally very mobile. I love all my little tools -- I carry my Air, iPad and iPhone plus a few other bits whereever I go. Now, just because I can work anywhere does not mean that I always like to. Depends on what I need to get done. My home office space is my ideal working environment. This is the one spot I have invested the most time in making comfortable for me and as such, this is where I do my best work. For you, it may be your office at work.

8771100164_773ee10e20_o.png

Why?

I had never given much thought to why I like this space the most..it seems obvious…but one item that makes this spot ideal: my desk phone.

My desk phone is large, reliable and comfortable. It has an easy interface, great speakerphone and a good headset always attached. This communication device, sitting right next to my iMac, makes communication rich and easy. When I sit here -- I can get anything done. Anything.

So as silly as it seemed when I first heard it, the idea that Cisco was investing in the deskphone, now makes sense. Mobile phones, tablets..these are all obvious, well worn markets with lots of people fighting for a toe-hold. The desk phone? How delightfully contrarian. Cisco is really good in the business space..selling to consumers…not so much. But the enteprise…at all levels…have very unique needs.

Cisco’s move with the DX650 is brave, and based on what I have seen…really smart.

Read More »

Tags: , , , , , , ,

Help Her Say “Yes” to the Dress

Ever had a customer who hesitates to buy a dress because she worries she’ll never find the right accessories to tie the look together? Or because she’s just not sure it’ll pass the boyfriend test?  Too often such customers leave empty-handed, promising to come back with the man and/or potential shoes and jewelry in tow so she can decide.

Sometimes she comes back. Usually she doesn’t.

That doesn’t have to happen anymore, and retailers have technology to thank for it.

Read More »

Tags: , , , , ,

Barry O’Sullivan: 2012 Collaboration Predictions

This week in No Jitter, Cisco Collaboration Senior Vice President and General Manager Barry O’Sullivan looked into his crystal ball and elaborated on his predictions for 2012.

In an excerpt, Barry predicts:

“1. Post PC-era will explode

2. Video will break through

3. Contact Centers will evolve as customers choose to interact with companies in radically new ways

4. Companies will use the cloud and desktop virtualization to provide collaboration capabilities across the enterprise

5. Social business processes will become mainstream for many.”

Read Barry’s predictions in more detail and the follow-up answers Barry gave to Eric Krapf’s questions. I trust you’ll enjoy reading the article.  Send in your predictions for 2012 for collaboration, video, social software, and contact center.

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

IT Managers Speak Out on Tablets in their Enterprises

It is no secret that alternative communication devices including tablets are taking a big chunk of the market away from what normally would be “PC territory”. Clearly the popularity of tablet form-factor devices is soaring.  The craze started in the consumer space and has definitely made waves in the enterprise market, too. If you do a search for “tablets in the enterprise” you’ll likely see north of 79 million results.

Cisco wanted to know what was top of mind for IT managers when it comes to tablet form-factor devices hitting their networks. So we asked them—1500 of them, from the US, UK, Canada, France, Spain, and Germany.

What were their thoughts on the “bring-your-own-device (BYOD) to work phenomena? Which country has the most security concerns? Which country leads in tablet requests from employees? How do they feel about issues like access to company applications?

This infographic shows some of the results that we found most intriguing; read our press release for more.

be sure to check out the press release for more details like these:

Read More »

Tags: , , , ,

Healthcare BYOD users, beware of the uninvited guest!

There are some interesting security developments on the BYOD front that may present serious HIPAA challenges for healthcare delivery organizations.  If you’re not following the story I’ll give you the quick summary.   Security consultant Trevor Eckhart discovered monitoring software from Carrier IQ on his Android based smart phone.  The software which he could not disable was placed there by the cellular carrier in an effort to monitor and enhance the end user experience.  His testing reviled that the software was able to log keystrokes, URL’s, GPS location and SMS text messages amongst other items.  All of the juicy information that is collected encrypted and uploaded to the carrier or manufacturer for “analysis” – NICE!

 The seriousness of the issue sparked a federal probe with Senator Al Franken sending a request to the software vendor, manufacturers and cellular carriers asking for specific details of the monitoring software capabilities and how the information collected is being used.   Many of the responses received to date raised many more questions than they answered. 

By the time you read this, the holiday season will be behind us.   The second longest post-holiday line over the dreaded Toys-R-Us return line is likely to be in front of the IS Support desk come “Monday Morning”.  All the Cindy Lou Who’s will be in line asking that their smart device be given access.      

It will be interesting to see the statistics, but I suspect that in comparison to previous years, it’s highly likely that many more BYOD smartphones and tablets will enter the healthcare environment.  One of the top care about for CIO’s is to provide rapid provisioning within their organization.  This is great, but I often wonder if responding to the demand could result in cutting the proverbial corner without knowing it!

Given the need to deploy a wide variety of BYOD devices quickly and securely, the healthcare Chief Security Officer (CSO) certainly has their job cut out for them these days.  The shire volume of consumer devices entering the enterprise environment raises some serious questions as to their readiness, especially in regard to security and privacy – add ePHI and the responsibilities of covered entities and you have some significant reason for concern.  Perhaps before a healthcare system adopts a BYOD policy, one should consider the ramifications of allowing the wide range of consumer devices (and contracted carriers) to access protected resources.  I’d suggest that it’s certainly time to consider the use of an enterprise ready device – one such as the Cisco Cius where you can control key aspects related to maintaining security and enhancing the user experience.

Cisco Cius with AppHQ is an Enterprise Ready Tablet

First, with the monitoring software described, don’t assume that your security policy by itself is sufficient.  Remember this software, as with others to likely follow, are key loggers.  Such applications by definition capture each and every keystroke and button press regardless of the application or transport/network encryption being used.  Many CSO’s may incorrectly conclude data loss is impossible given the use of VPN technology.   Likewise some will conclude that their adoption of VDI assures that the data stays local to the healthcare system and not to the device.  While partially true, we are effectively talking about keystrokes being logged.  Clearly a physician WILL over time enter data that is classified as ePHI – all nicely collected and uploaded unknowingly to a 3rd party.  Even SMS text messages sent or received by such a device is within scope!

My advice is to stay abreast of this developing story, and in the meantime, take the time necessary to fully understand the ramifications of allowing various devices (and carriers under contract) to access your protected resources.  It’s no longer about robust authentication mechanisms, secure encryption and remote wipes – It’s now much more than that!  Also remember that a device that is classified as “safe” today might not be in compliance after an OS upgrade or application install in the future.  Taking accountability for the device and the applications being loaded onto it by either the user or carrier is YOUR business.  Having a system in place that facilitates YOU being able to control the OS and the applications that are being installed on BYOD devices is a critical objective. 

So make sure that the next time you’re planning a BYOD party that you recognize all the guests being invited – otherwise some valuables in the form of ePHI may be slipping out the back door!

Tags: , , , , , , ,