Cisco Blogs


Cisco Blog > SP360: Service Provider

Carrier Wi-Fi for the Retail of Tomorrow

By Lisa Garza, Cisco Service Provider Marketing, Mobility Solutions

When we first started developing Cisco Connected Mobile Experiences several years ago, we had a vision that carrier-grade Wi-Fi could change how we interact with public environments.  We knew that the rich information that Wi-Fi provides indoors could enhance our experiences while shopping, watching sports, attending conventions, going to museums, and seeing shows.

It is so exciting to see this vision coming to life all around us.  One of the latest examples is the beautiful Stary Browar Mall in Poznań Poland.  Stary Browar is more than a mall.  It’s designed as a 50/50 combination of art and retail space, and the two come together to provide a unique shopping experience that can’t be found on the Internet.

Stary Browar

Read More »

Tags: , , , , , , , , , ,

Security Compliance is Necessary for Real-Time Mobile Data Access

August 21, 2014 at 9:00 am PST

As a business or technical leader, you know you need to protect your company in a rapidly evolving mobile ecosystem. However, threats are not always obvious. As malware and attacks become more sophisticated over time, business decision makers must work with technical decision makers to navigate security threats in a mobile world.

This blog series, authored by Kathy Trahan, explores the topic of enterprise mobility security from a situational level and provides insight into what leaders can do now to mitigate risk. To read the first post focused on securing device freedom, click here. The second post, available here, focused on the risks that come with mobile connections. Kathy’s third post explored how to secure mobile data. – Bret Hartman, Chief Technology Officer (CTO) for Cisco’s Security Technology Group

In today’s mobile and cloud-centric landscape, the ability for employees to access data, account information, real-time statistics, and other pertinent information on their personal devices is what it takes to remain competitive in the business marketplace.

And while the rush has been on to empower employees to be able to connect from anywhere, security concerns are topping the “must address” list of enterprises everywhere.

One key concern is the increasing use of mobile devices to access relevant business information. In fact, according to the Cisco Connected World International Mobile Security survey, 63% of users downloaded sensitive data on such devices.

So, in a scenario where a team of sales representatives are updating account profiles by accessing data on their personal devices, IT and business leaders must ask: How secure is the network the team is using to access sensitive company information? Is it possible malware on their mobile devices can gain entry from a public or private cloud to compromise or steal data? Should mobile security policies prohibit certain employees from downloading certain information when they are off-site?

These questions must be answered. Especially since over the next four years, there will be nearly 21 billion networked devices and connections globally. Business Decision Makers (BDMs) and Technical Decision Makers (TDMs), must team up and determine the best mobile security policies that balance productivity and security of sensitive data, notably understanding security threats and establishing access requirements.
Read More »

Tags: , , , , , , , , ,

VoLTE Policy Management to Improve Subscriber Experience and Lower Cost of Growth

Written By Alfonso San Jose, Sales Consulting Systems Engineer

Alfonsov2

We have been hearing from our Service Provider customers like you about their interest in Voice over Long Term Evolution (VoLTE), and for good reason.  Offering VoLTE affects profitability in two ways. One is by creating a great voice experience that helps to attract and retain subscribers. VoLTE provides guaranteed quality of service and fast call-setup time. At the same time, VoLTE can lower network costs. However, VoLTE creates new demands on the network that requires a policy management solution to address. VoLTE changes the game for policy management because it imposes much heavier demands than 4G data services. The policy management solution needs to meet the following four requirements: Read More »

Tags: , , , , ,

#CiscoChampion Radio S1|Ep11 Mobility and Connected Mobile Experiences (CMX)

May 6, 2014 at 3:04 pm PST

#CiscoChampion Radio is a podcast series by Cisco Champions as technologists, hosted by Cisco’s Amy Lewis (@CommsNinja). This week Bob Friday, VP CTO Mobility at Cisco, joins Cisco Champions Sven Kutzer and Stephen Rodriguez. The topic is Mobility and Connected Mobile Experiences (CMX). This week Cisco’s Lauren Friedman (@Lauren) guest hosts.

Listen to the Podcast

Cisco Subject Matter Expert:
Bob Friday, VP CTO Mobility at Cisco

Cisco Champions:
Stephen Rodriguez, Wireless Engineer (@WiFiJanitor)
Sven Kutzer, Senior Systems Engineer (@SvenKutzer)

Highlights:
Foundation of the Connected Mobile Experience (CMX)
How CMX applies to transportation, retail and hospitality
Where we’re going with indoor location technology, from probe based location to network based and network assisted track
Standardization of location technology
Surprising CMX deployment examples Read More »

Tags: , , , ,

17 Signs You Could Be A CiscoChampion for Enterprise Networks

Cisco Champions CVD Beach ReadingIf you see yourself in any of the following, you might be a Cisco Champion for Enterprise Networks.

  1. You’ve named your pet cat “6k”
  2. News of a new .11ac AP excites you
  3. CVDs are beach reading
  4. You can name more than 4 services offered on an ISR
  5. You know why there aren’t IOS ver. 13 nor 14
  6. Your home network scares some visitors. Others want to borrow it for study
  7. Downgrading someone’s QoS (allegedly) is your idea of a practical joke
  8. Your CCIE number is in your twitter profile Read More »

Tags: , , , , , , , ,