As you may have read, Apple’s iOS 8 will come with some changes to the way MAC addresses are exposed in Wi-Fi probe requests. Apple’s intent was to provide an additional layer of privacy for consumers and target those companies that offer analytics without providing any value to the end consumer. We’ve been getting some questions about what this means and how it impacts our Connected Mobile Experiences (CMX) solution, so we wanted to clear this up for our customers.
What does this mean for you?
First and foremost, Cisco has always been dedicated to privacy for our customers and their end-users. There are four aspects of privacy that are built into our CMX solution:
1. Anonymous Aggregate Information: All analytics are based on aggregate, anonymized location data.
2. Permission-based: Users have to opt-in to join a Wi-Fi network or download an app
3. MAC Address Hash: Users’ MAC addresses can be hashed before exposing to 3rd party apps
4. Opt Out: End-users are always presented with the option to opt out of location-based services
The true value of CMX analytics for organizations is in aggregate location data to be used for business analysis to improve the customer experience for end-users. Providing customers with high performing Wi-Fi not only keeps always-on mobile users happy and opens the doors to delighting customers with more personalized experiences, but also helps provide more granularity to those aggregate trends to feed back into the experience creation machine. Win-win.
What does this mean for our CMX value proposition? Read More »
Tags: address, aggregate, analysis, analytics, App, Apple, application, Cisco, cmx, connect, consumer, customer, data, download, engage, experience, IOS, ios 8, ios8, lbs, location, location based services, location-based, login, mac, mac address, market, meraki, mobility services engine, mse, network, onboard, permission, Presence, privacy, probe, probe request, services, trend, value, value proposition, wi-fi, wifi, wireless
Englewood Cliffs public schools system, based in Bergen County, New Jersey offers classes to children from K-8 grades. The school system consists of two schools, the North Cliff school serving grades from K-2 and the Upper school serving grades from 3-8. The school system utilizes cutting-edge technology to assist learning from the classrooms equipped with technology, the 1 to 1 computer tablet initiative to the 6th, 7th and 8th graders to upgrading to the best-in-class wired and wireless infrastructure needed to support the advanced technologies.
At a Glance:
Located in: Bergen County, New Jersey
Number of students: 478
Number of teachers: 39
Access-Points: Thirty three units of 3602i with the 802.11ac module and two units of 3602e
Switch and Controller: Ten units of 3850 Series switch, that offers 40 Gig of line-rate performance even with imix traffic. Wireless LAN controller functionality is run within the switch itself. The switches are deployed in stacks of two and the rest are single switches. The wireless controller functionality is operating on the main stack in each school MDF. Operating in the latest release IOS-XE 3.3.3 Read More »
Tags: 11ac, 802.11, 802.11ac, access point, controllers, Converged Access, customer, deployment, education, englewood cliffs, equipment, Gig, imix, infrastructure, initiative, IOS XE, K-8, macbook, mdf, network, performance, school, switch, tablet, technology, UA, unified access, wi-fi, wifi, wired, wireless, wlan
Gartner has released their 2014 Magic Quadrant for Wired and Wireless LAN Infrastructure. For the 3rd year in a row, Cisco is recognized as a leader in both vision and execution. We believe this Gartner recognition is validation of Cisco strategy and investments for unified access, policy management and cloud managed solutions.
Cisco’s position in the Wired and Wireless Gartner MQs has been consistent over the past 3 years as the market landscape has shifted we believe validating our commitment to meeting shifting customer priorities and requirements.
The 2014 Gartner Magic Quadrant for the Wired and Wireless LAN Access Infrastructure (Authors: Tim Zimmerman, Andrew Lerner, Bill Menezes; Published 26th June 2014) reflects the evolution from prior years and highlights what customers are looking for:
“With limited growth in IT resources, administrators require one network management application, one access security solution, one guest access application or one policy enforcement solution with the flexibility to be deployed in a public cloud, private cloud or on-premises. This integration reduces the costs associated with the upfront capital expense of multiple network service applications each dedicated to either the wired infrastructure or the wireless or cloud components. This savings is also extended to the ongoing software maintenance costs of all access layer management, security and policy enforcement components.”
What Does Being a Leader Mean? Read on for the full story Read More »
Tags: #80211ac, #wireless, 802.11ac, access, access point, analyst, App, application, aruba, Cisco, customer, data, enforcement, Gartner, HP, Industry, infrastructure, IT, LAN, landscape, leader, Magic Quadrant, market, mobile, mobility, MQ, network, policy, quadrant, secure, security, service, technology, unified access, wifi, wired, wireless, wlan
In the past few weeks, I’ve received two replacement credit cards. And, no, this does not indicate I’ve done too much shopping! It means that hackers are continuing to target retailers and the bank decided I needed to be protected by new credit card numbers.
I’m Carol Ferrara-Zarb, and as the leader of Cisco’s Security Solutions team, I’m joining the Cisco Retail blog today to talk to you about security and compliance in the store. While consumers certainly worry about security, the concerns of retailers are magnified because you are among the highest-profile targets right now for professional hacker attacks. Store owners and operators are just about lying awake at night wondering who is going to be next.
At the same time, change is continuing on the security front, particularly in the area of PCI compliance. At the end of this calendar year, the new 3.0 version of the PCI DSS mandate will come into force. Are you ready for the new requirements?
If you’re a Cisco customer, you very well may be. Join us on July 23 for a free, one-hour webcast called, “Straight Talk about Reducing Complexity and Maintaining Compliance in Retail.” Cisco Security Architect Christian Janoff, who sits on the PCI Security Standards Council Board of Advisors, and Aaron Reynolds, PCI Managing Principal for Cisco partner Verizon, will lead a candid discussion on retail security. The session covers:
- The changes in the PCI DSS 3.0 mandate and their impact on your retail business
- How to satisfy three standards—PCI, SOX, and HIPAA—by configuring one control
- Implementing the latest, simplified strategies for PCI scope reduction, and how they can be superior to traditional methods for many retailers
You’ll come away with an overview of today’s threat landscape, and we’ll put it all into perspective to support your continued pursuit of compliance and retail success. Registrants will also receive the Simplifying Compliance Answer Kit, a set of documents and tools to help you understand compliance better.
The webcast takes place on July 23 at 10:00 am PT/1:00 pm ET. Please register today! Be sure to bring your questions to take part in the discussion.
We’ll see you there!
Tags: Carol Ferrara-Zarb, compliance, credit card, customer, data, HIPAA, information, pci, retail, security, shopper, sox, standard, threat, webcast
In just two years, indoor location technology has taken off and attracted a lot of buzz across industries, from retailers to healthcare. But it’s no longer a conversation about just Wi-Fi – the introduction of beacon devices, including iBeacon, has added a new dimension to location technology for IT and their line of business counterparts to grapple with on how to leverage it to better reach their customer base.
Some customers have been asking about beacon technology and how it fits in with Wi-Fi, so let’s start from the beginning:
How do beacons work?
Beacons are sensors that send out Bluetooth low energy (BLE) tracking tags. These sensors can be placed around a venue, such as a store, and a mobile device can pick up the BLE signal and determine that it is in close proximity. When a mobile app is built off of this technology, it can be used in interesting ways to interact with the end user, such as notifying a customer of a promotion for an item they are close to.
I’m having trouble differentiating Wi-Fi and beacons. What do I need to know? Read More »
Tags: access, analytics, Apple, beacon, BLE, bluetooth, byod, Cisco, cmx, consumer, customer, deployment, device, dimension, Enterprise, GPS, granular, Guest, healthcare, ibeacon, indoor, Indoor location, IT, lbs, line-of-business, location, location based services, marketing, mobility, mobility services engine, mse, network, operation, productive, productivity, proximity, retail, sales, tag, technology, track, tracking, wi-fi, wifi, wireless, wlan