Cisco Blogs


Cisco Blog > Mobility

Behind the Network @ Mobile World Congress 2014: Hotspot 2.0

Mobile World Congress (MWC) 2014 was the largest mobile industry exhibition in the world, where over 1800 companies showcased and launched their latest products and services. This event was visited by over 85,000 attendees from over 200 countries around the world, to learn, network, inspire and innovate. Providing them seamless and robust data network was the first priority. GSMA , Fira de Gran Via and Cisco took this challenge to provide them next generation Wi-Fi experience with seamless connectivity and onboarding using Hotspot 2.0 service on the top of baseline free Wi-Fi service.

Hassle and risk are the two key factors involved in connecting free public Wi-Fi. When you are traveling in the different countries, you get off the plane and turn on your cell phone… and within few seconds you get connected to the cellular network. There is no need to search for a suitable network manually (hoping it’s not rigged by a hacker), then enter long password or credit card details to pay for the service. But unfortunately connecting to Wi-Fi is not that simple. Hotspot 2.0 Service addresses these problems by automatic network discovery and selection, seamless network access and secured authentication for the Passpoint certified devices.

mwc1Fira Gran Via, Barcelona, the venue of MWC 2014 is a massive 280,000 meters2 (Three Million Square Feet) facility with 8 grand exhibition halls, conference rooms, multiple outdoor areas and restaurants. Read More »

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

The Key to Success in Tracking Mobile Devices: Symbiosis, Not Espionage

As a shopper enters a store, the retailer uses Wi-Fi to track her movements, interests, and shopping habits, providing a treasure trove of insight valuable to merchandising and product development alike.

And as advances in Wi-Fi promise increasing location precision and beacons promise pinpoint location based services, the future appears to be smooth sailing, right?

Well, not exactly.

Tracking the position of mobile devices accurately and correlating to personal data has been one of the most sought after Big Data objectives. And not just for retailers — the potential wealth of business value from data has drawn piqued interest across nearly all industries.

Yet in the real world, issues arise from both technology challenges and privacy concerns alike.

Technology challenges include:

  • Typical Wi-Fi accuracies in the 7-to-10 meter range (though Angle of Arrival and improved location analytics promise dramatic improvements)
  • Infrequent mobile device probing to conserve battery power
  • Interference from metal shelves & fixtures, water in products (and people!)

Privacy qualms speak to the heart of transformation in the Internet of Everything (IoE) age. IoE, after all, is the explosion of network connections among people, process, data, and things — and promises to be one of the most impactful periods of change in our history. And the people element is in some ways the whole point — to make our lives better, healthier, more efficient, and so forth. But the people issues will be just as challenging as those that arise around technology. Read More »

Tags: , , , , , , , , , , , , , , , , , , , , , , , , ,

Apple iOS 8 and MAC Randomization: What It means for Cisco’s Connected Mobile Experiences (CMX) Solution

As you may have read, Apple’s iOS 8 will come with some changes to the way MAC addresses are exposed in Wi-Fi probe requests. Apple’s intent was to provide an additional layer of privacy for consumers and target those companies that offer analytics without providing any value to the end consumer. We’ve been getting some questions about what this means and how it impacts our Connected Mobile Experiences (CMX)  solution, so we wanted to clear this up for our customers.

What does this mean for you? 

First and foremost, Cisco has always been dedicated to privacy for our customers and their end-users. There are four aspects of privacy that are built into our CMX solution:

1. Anonymous Aggregate Information: All analytics are based on aggregate, anonymized location data.

2. Permission-based: Users have to opt-in to join a Wi-Fi network or download an app

3. MAC Address Hash: Users’ MAC addresses can be hashed before exposing to 3rd party apps

4. Opt Out: End-users are always presented with the option to opt out of location-based services

The true value of CMX analytics for organizations is in aggregate location data to be used for business analysis to improve the customer experience for end-users. Providing customers with high performing Wi-Fi not only keeps always-on mobile users happy and opens the doors to delighting customers with more personalized experiences, but also helps provide more granularity to those aggregate trends to feed back into the experience creation machine. Win-win.

What does this mean for our CMX value proposition? Read More »

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

Third Time’s A Charm: Cisco is a Leader in the Gartner Magic Quadrant for Wired and Wireless LAN Access Infrastructure Again!

Gartner has released their 2014 Magic Quadrant for Wired and Wireless LAN Infrastructure.  For the 3rd year in a row, Cisco is recognized as a leader in both vision and execution.  We believe this Gartner recognition is validation of Cisco strategy and investments for unified access, policy management and cloud managed solutions.

Cisco’s position in the Wired and Wireless Gartner MQs has been consistent over the past 3 years as the market landscape has shifted we believe validating our commitment to meeting shifting customer priorities and requirements.

Qartner Magic Quadrant 2014
This graphic was published by Gartner, Inc. as part of a larger research document and should be evaluated in the context of the entire document. The complimentary copy of the Gartner document is available to view here.

The 2014 Gartner Magic Quadrant for the Wired and Wireless LAN Access Infrastructure (Authors: Tim Zimmerman, Andrew Lerner, Bill Menezes; Published 26th June 2014) reflects the evolution from prior years and highlights what customers are looking for:

With limited growth in IT resources, administrators require one network management application, one access security solution, one guest access application or one policy enforcement solution with the flexibility to be deployed in a public cloud, private cloud or on-premises. This integration reduces the costs associated with the upfront capital expense of multiple network service applications each dedicated to either the wired infrastructure or the wireless or cloud components. This savings is also extended to the ongoing software maintenance costs of all access layer management, security and policy enforcement components.”

What Does Being a Leader Mean?  Read on for the full story Read More »

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

Retailers Lying Awake at Night – Who’s Next?

In the past few weeks, I’ve received two replacement credit cards. And, no, this does not indicate I’ve done too much shopping! It means that hackers are continuing to target retailers and the bank decided I needed to be protected by new credit card numbers.

I’m Carol Ferrara-Zarb, and as the leader of Cisco’s Security Solutions team, I’m joining the Cisco Retail blog today to talk to you about security and compliance in the store. While consumers certainly worry about security, the concerns of retailers are magnified because you are among the highest-profile targets right now for professional hacker attacks. Store owners and operators are just about lying awake at night wondering who is going to be next.

At the same time, change is continuing on the security front, particularly in the area of PCI compliance. At the end of this calendar year, the new 3.0 version of the PCI DSS mandate will come into force. Are you ready for the new requirements?

If you’re a Cisco customer, you very well may be. Join us on July 23 for a free, one-hour webcast called, “Straight Talk about Reducing Complexity and Maintaining Compliance in Retail.” Cisco Security Architect Christian Janoff, who sits on the PCI Security Standards Council Board of Advisors, and Aaron Reynolds, PCI Managing Principal for Cisco partner Verizon, will lead a candid discussion on retail security. The session covers:

  • The changes in the PCI DSS 3.0 mandate and their impact on your retail business
  • How to satisfy three standards—PCI, SOX, and HIPAA—by configuring one control
  • Implementing the latest, simplified strategies for PCI scope reduction, and how they can be superior to traditional methods for many retailers

You’ll come away with an overview of today’s threat landscape, and we’ll put it all into perspective to support your continued pursuit of compliance and retail success. Registrants will also receive the Simplifying Compliance Answer Kit, a set of documents and tools to help you understand compliance better.

The webcast takes place on July 23 at 10:00 am PT/1:00 pm ET. Please register today! Be sure to bring your questions to take part in the discussion.

We’ll see you there!

Tags: , , , , , , , , , , , , , ,