“If you want to use the music from Frozen in your game, do you know how to download a gif to match?” Not the average question I have heard in a conference room at Cisco headquarters in San Jose, California, especially when asked to 7-year-old girls! The girls were part of a group of 14 children participating in a coding camp held at Cisco and put on by Embark Labs. The goal of the event is to teach 7 to 10 year olds to have fun while learning how to program.
As a business or technical leader, you know you need to protect your company in a rapidly evolving mobile ecosystem. However, threats are not always obvious. As malware and attacks become more sophisticated over time, business decision makers must work with technical decision makers to navigate security threats in a mobile world.
This blog series, authored by Kathy Trahan, will explore the topic of enterprise mobility security from a situational level and provide insight into what leaders can do now to mitigate risk. To read the first post focused on securing device freedom, click here. The second post, available here, focused on the risks that come with mobile connections. – Bret Hartman, Chief Technology Officer (CTO) for Cisco’s Security Technology Group
The Cisco Visual Networking Index revealed an obvious truth that none of us can deny—mobile data traffic is on the rise and shows no signs of stopping:
- By 2018, over half of all devices connected to the mobile network will be “smart” devices
- Tablets will exceed 15 percent of global mobile data traffic by 2016
- By the end of this year, the number of mobile-connected devices will exceed the number of people on earth, and by 2018, there will be nearly 1.4 mobile devices per capita
With the explosion in the number of smart mobile devices and employees increasingly taking advantage of BYOD, securing company and personal data in a world where the mobile endpoint is a new perimeter presents technical and legal challenges for organizational leaders.
What are some of the most prevailing challenges? The personal use of company-owned devices happens more frequently than IT may realize and a complex legal environment can leave both employees and IT confused on how personal privacy is being protected. It is important for human resources to weigh in here as well.
This fall your wireless networks will experience many devices upgrading to the new Android 5.0(L-release) and Apple iOS 8 releases (cue: IT managers groan). There have now been many blogs attempting to capture the enhancements expected with these releases. Today I am going to focus on describing how Android L and iOS 8 may affect customers deploying Cisco enterprise grade Wi-Fi networks based upon our research and testing of the Apple seed. Our verdict: Carry on with business as usual.
Here are four features we predict will have the most impact your networks:
1. Chromecast and Google Cast Enhancements (Android L)
Rishi Chandra, the Director of Chromecast Product Management announced that, starting with the Android L release, users have the ability to cast to your neighboring devices such as a TV without having to connect to your Wi-Fi network. In the demo, a phone used the cellular connection to connect to chromecast through the cloud. A variety of techniques are used to authenticate the users in the same room OR use a pin-code as an alternative. Users can Google Cast an ecosystem of applications or even their own applications over any Android or iOS device as well as Cloud based apps on Chrome.
Predicted Impact: Given that this feature works transparently to the Wi-Fi, it is expected that there is no impact on the WLAN in your classrooms or dorm rooms or auditoriums where this will most likely be used.
2. Peer-to-peer AirPlay discovery and playback (iOS 8)
Starting with the iOS 7.1 release, AirPlay devices will discover an AppleTV via the bluetooth network. Users could also secure their AppleTV via a 4 digit pin-code. With the iOS 8 release, Airplay devices can also mirror their content via Airdrop. This feature offers an alternative method for customers to discover and mirroring of Bonjour traffic without accessing the corporate Wi-Fi network.
Predicted Impact: Again this feature operates transparent to the Wi-Fi and therefore customers using this feature should not see any impact on the WLAN. Cisco wireless customers also have the ability to use the Service Discovery Gateway on Cisco IOS based switches, routers or wireless LAN controllers or the Bonjour Services Directory on AireOS controllers. Read More »
Tags: 5.0, 802.11, airdrop, aireOS, airplay, App, Apple, appleTV, application, authenticated, AVC, bluetooth, Bonjour, bonjour services directory, calling, cellular, chrome, chromecast, Cisco, client, client mix, cloud, controller, customer, deployment, enhancement, Enterprise, Google, HDX, health, interference, IOS, ios 8, ios8, LAN, location, mac, mac address, mdns, meraki, messaging, Mission Critical, mse, network, optimized, peer-to-peer, QoS, radio management, release, roaming, Rogue, Service Provider, SP, Voice, wi-fi, wifi, wireless, wlan
Out here in Southern California, in a town called Huntington Beach, is a growing Auto Shop called Auto Union Tuning.
It is a special place where the owners, Dave and Raz specialize in car care, maintenance and tuning of VW, Audi and Porsche automobiles. On any day, you will find a combination of these three car makes on the lifts and in the garages. From quick VAG-com checks to complete engine rebuilds, you name it, this shop can take care of most work.
There is one specific car they specialize in is the Audi B5 S4. This particular model is sought after by Audi enthusiasts for the tuning potential. This S4 was manufactured between 1997 and 2002, which sported a twin-turbocharged 2.7 liter inline 6 cylinder engine. Some key upgrades can make a 10+ year old car beat new Nissan GTR’s, Supercharged BMW M3′s, Supercharged Corvette’s, Vipers, Shelby’s etc. down a quarter mile.
But alas, that is another story.
I first met Raz back when I was in search of someone to work on my own B7 Audi S4 Avant. Thankfully, I met Raz and he worked on my baby until I sold her to a gentleman that flew out from Salt Lake City and bought my Audi S4 site unseen. This largely because of a conversation I recommended my buyer to have with AUT. Yes, AUT did a good job not only maintaining and caring for my then car. But it is the countless other AUT customers who told others about their experience in how AUT handled their customers and their customers cars. Simply, the they did a great job in running a great business. In the few years I have known the owners, I have seen their business being born, move into a small shop, expand into neighboring units, then move into their current facility, which I must say, is impressive.
With all of this growth, Raz and Dave has seen their network needs and requirements evolve. At first, basic network connectivity using a consumer all-in-one router did it’s job obediently for the first few years, but once they moved into the new facility, things had to change. Simply, the networking strategy had to grow up.
Fast Forward to today, there’s now a total of two new mechanics, office employees, three new workstations and a new ticket writing software that needs to be available on multiple workstations. No doubt new employees and more requirements on their network will be coming in the future.
Yes, Raz and Dave have planned for growth. The new waiting room and front office now houses new couches and a TV. New wheel displays are set-up, vendor banners are hung, and the walls are newly painted.There is a bunch of exhaust and performance parts displayed around the room.
But this planning also included a new need for wireless guest access and of course a secure network where Auto Union Tuning Employees can access secure files and applications, such as the new ticket software. With some discussion, and some assistance, Team AUT procured new Cisco Small Business product, including one of Ivor’s 300 Series PoE Managed Switches, and a pair of Nasser’s WAP551 wireless access points. All of the workstations are hard-lined into the 300 Series Switch, and the WAP551′s are set-up and deployed with a guest network and secure internal network and they are now providing blazing performance in the office and garage workspaces. The entire deployment was said to be under 30 minutes. Much of the time savings was due to the WAP551′s Single Point Setup. The team has some cleanup work, cable management, mounting the wireless access points, but most of the heavy lifting work is complete. The AUT Team is happy with the new network and greeting new customers every day.
Auto Union Tuning is but one example of how a small business can literally take off from day one and transform and evolve into a growing, thriving business. With honest, good old fashioned hard work comes success and growth. With this growth comes the necessity for it’s networking infrastructure to be flexible and scalable.
We think you will find that the Cisco Small Business portfolio fits this model rather well.
Thanks for the read.
Tags: 11ac, access point, audi, business, Cisco, cisco wireless network, Flexibility, free, growth, network, network software, next-generation wireless, porsche, router, scalable, small, small business network, software, switch, update, volkswagen, wlan
Apple iOS 8 and MAC Randomization: What It means for Cisco’s Connected Mobile Experiences (CMX) Solution
As you may have read, Apple’s iOS 8 will come with some changes to the way MAC addresses are exposed in Wi-Fi probe requests. Apple’s intent was to provide an additional layer of privacy for consumers and target those companies that offer analytics without providing any value to the end consumer. We’ve been getting some questions about what this means and how it impacts our Connected Mobile Experiences (CMX) solution, so we wanted to clear this up for our customers.
What does this mean for you?
First and foremost, Cisco has always been dedicated to privacy for our customers and their end-users. There are four aspects of privacy that are built into our CMX solution:
1. Anonymous Aggregate Information: All analytics are based on aggregate, anonymized location data.
2. Permission-based: Users have to opt-in to join a Wi-Fi network or download an app
3. MAC Address Hash: Users’ MAC addresses can be hashed before exposing to 3rd party apps
4. Opt Out: End-users are always presented with the option to opt out of location-based services
The true value of CMX analytics for organizations is in aggregate location data to be used for business analysis to improve the customer experience for end-users. Providing customers with high performing Wi-Fi not only keeps always-on mobile users happy and opens the doors to delighting customers with more personalized experiences, but also helps provide more granularity to those aggregate trends to feed back into the experience creation machine. Win-win.
What does this mean for our CMX value proposition? Read More »
Tags: address, aggregate, analysis, analytics, App, Apple, application, Cisco, cmx, connect, consumer, customer, data, download, engage, experience, IOS, ios 8, ios8, lbs, location, location based services, location-based, login, mac, mac address, market, meraki, network, onboard, permission, Presence, privacy, probe, probe request, services, trend, value, value proposition, wi-fi, wifi, wireless