Cisco Blogs


Cisco Blog > Security

Dimension Data Series #4- The Opportunities and Risk of Secure Mobility from the Top Down

Mobile security is a top concern for IT and business leaders. This blog series with Dimension Data explores how organizational leaders can work together to mitigate concern and implement clearly defined policies and mobility goals. This blog will address the opportunities and risk of secure mobility from the top down. The first blog in this series discussing how concerns outweigh actions when it comes to mobility security can be found here. The second blog in this series highlighting how IT and business leaders can work together to develop secure mobility policies can be found here. The third blog in this series discussing how to close the gap between vision and real-world implementation can be found here.

Throughout this blog series, we’ve discussed several key aspects of implementing secure mobility policies and programs to ensure organizations can reap the benefits of mobility now and in the future. It’s clear that mobility is a top priority for IT and business leaders and most have a clear vision of the role mobility can and will play in their organization. Overall, they see both the risks and the rewards.

That said, responses gathered in the recent Dimension Data Secure Mobility Global Survey point to a gap between that overall vision and the likely real-world outcomes organizations will face – given that a number of crucial initial steps can ultimately save time, reduce costs, and, most importantly, ensure appropriate security controls are in place.

In this post, I’ll highlight the real opportunities and risk regarding mobility and security – and how business leaders can address the disparity between vision and actual deployment now and for years to come.

Understanding the Opportunity and the Real Risk

The threat to an organization’s proprietary information is certainly foremost in the minds of IT and security leaders. Interestingly, 71% of respondents of the recent Dimension Data survey indicated that their business leaders view employee utilization of personal mobile devices as potentially dangerous, costly and not business critical.

IT concerns about secure enterprise mobility risk are many. These include the introduction of malware into the environment from largely unmanaged devices or devices that organizations have little to no control over and the data leakage challenges by allowing users to have various parts of data outside of the network. In addition, many IT leaders ask:

  • “How are we actually going to deploy mobility security?”
  • “How are we going to support the users?”
  • “Will our IT help desk be able to meet the around-the-clock requests that today’s users demand?”

Read More »

Tags: , , ,

Moving at #Cloud Speed: CiscoLive Intercloud News

May 20, 2014 at 7:00 am PST

This week we are celebrating with more than 25,000 attendees at the Moscone Center in San Francisco, and many more viewers  on line the 25th anniversary of Cisco Live and it’s an exciting time for Cisco and our partners! As John Chambers described it so eloquently  in his Monday keynotes, customers are embracing the opportunities around the Internet of Everything and are looking for us to help them realize the benefits and manage the transition. And cloud deployment is certainly a critical component of this new IT world.

Since we announced our Intercloud strategy at Partner Summit, it continues to build momentum. This week, we are taking the next bold step and announcing new offers and new partnering models.   We are expanding beyond our hosted collaboration and SaaS offerings with a richer set of cloud services.

Cisco is Moving Fast with our Partners to deliver on the Promise of an Intercloud

Read Robert Lloyd bio.

Read Robert Lloyd bio.

Rob Lloyd President, Development and Sales  intends to demonstrate in his keynotes  how fast Cisco has been able to move by driving a partner-centric Cloud strategy.

You can watch on line Rob’s keynote  for a deeper dive into what is happening both at Cisco and with our customers as the Internet of Everything becomes a reality.  Find out what Cisco is doing today, what we’re planning in the future, and what others are doing to tap into the power of the Internet of Everything.

You may also want to read the press release and Rob’s companion blog.

Edison Peres, Senior Vice President, Worldwide Channels at Cisco. Read his bio.

Edison Peres, Senior Vice President, Worldwide Channels at Cisco.

A partner-centric approach differentiates Cisco and our partners

Innovation is required to meet the rapidly changing business requirements for cloud, mobile and the Internet of Everything. With that, new Intercloud reference architectures are being added to the Cloud and Managed Service Program for partners who deliver Cisco Powered services.

You can learn more in a new blog by Edison Peres, Senior Vice President of Cisco Cloud and Managed Service Organization (CMSO):  Cloud Evolution: A Journey Together.

Aligning Your Strategy and Business for Cloud Success

Dr. Gee Rittenhouse and Faiyaz Shahpurwala

Dr. Gee Rittenhouse and Faiyaz Shahpurwala

This afternoon , Cisco executives Dr. Gee Rittenhouse –CDO and Faiyaz Shahpurwala -- Senior Vice President, Cloud Infrastructure and Managed Services share our hybrid cloud strategy with you, including solutions such as Cisco InterCloud and Intelligent Automation for Cloud. They also discuss in their keynotes  the role of applications and our partner ecosystem.

If you missed out on the Cloud Technology Trend Keynote – Aligning Your Strategy and Business for Cloud Success by Dr. Gee Rittenhouse and Faiyaz Shahpurwala, you’ll want to catch the on-demand replay.

In this session, Dr. Gee Rittenhouse and Faiyaz Shahpurwala provide use cases and insights to answer the following questions:

    • How do you evolve your strategy at the right time with the right model?
    • Which cloud is right for which workload?
    • What is “fact or fiction” amid all of the cloud discussions and options?
    • Is your strategy aligning you for success?
    • Are your investments today setting you up for future success?

Watch CiscoLive sessions on-demand

Follow the CiscoLive on-demand conversation on Twitter #CL365 

Additional Cloud Information:

Imagine a new IT: A Bold Next Step for the World of Many Clouds

Imagine a new IT: A Bold Next Step for the World of Many Clouds via YouTube

Enterprise At-A-Glance (AAG) -- PDF

Provider At-A-Glance (AAG) -- PDF

Infographics:

Additional Resources 

 

 

Read the press release:Cisco and Dimension Data to Accelerate Global Hybrid Cloud Adoption.  Dimension Data Named Cisco’s First Global Intercloud Partner, Expanding on Successful 23-Year Relationship

 

Tags: , , , , , , , , , , , , , , , ,

Cisco is Moving Fast with our Partners to deliver on the Promise of an Intercloud

It’s hard to believe it was only eight weeks ago that I announced Cisco’s $1B investment in a bold Intercloud strategy to 10,000 partners and colleagues in Las Vegas..

Today, Cisco announced additional Intercloud partners and offerings, and on the main stage at our 25th anniversary Cisco Live! event in San Francisco this morning, I’ll demonstrate how fast we’ve been able to move by driving a partner-centric Cloud strategy.

FYI: You can watch my keynote on the Cisco Live web site.

Our customers have been asking Cisco to expand beyond our hosted collaboration and SaaS offerings (such as WebEx, Meraki and Cisco Cloud Web Security) with a richer set of cloud services. Today, in San Francisco, we are announcing a substantial expansion of those services with new infrastructure-as-a-service offerings and cloud disaster recovery applications that leverage the cloud platforms of new Intercloud partners Dimension Data and Sungard Availability Services. They join Telstra as our first Intercloud partners.

Read More »

Tags: , , , , , , , , , , , ,

Dimension Data Series #3: Closing the Gap Between the Secure Mobility Vision and Real-World Implementation

Mobile security is a top concern for IT and business leaders. This blog series with Dimension Data explores how organizational leaders can work together to mitigate concern and implement clearly defined policies and mobility goals. This blog will address closing the gap between secure mobility vision and real-world implementation. The first blog in this series discussing how concerns outweigh actions when it comes to mobility security is here. The second blog in this series highlighting how IT and business leaders can work together to develop secure mobility policies is here.

There is a gap between the vision for secure mobility and the real-world implementation.

How do we know a gap exists? A recent Dimension Data Secure Mobility Survey report indicates 79% of IT leaders believe mobility is a top priority and 69% of those surveyed already have a mobility roadmap in place. The vision looks good, right? However, only 29% of those implementing their roadmap have tested their core applications, and only 32% have conducted a security audit of the applications.

Today, IT is faced with the challenge of providing any user from any location on any device access to any of the corporate applications, all while keeping assets and users secure. These perimeters add up to a complex equation and it’s contributing to this gap in IT leaders’ approach to vision and action for mobility deployments. How can IT and business leaders work to address this disparity?

Listed below are a few steps that should be considered to help turn the secure mobility vision into a reality. Taking a careful assessment of what mobility can offer and applying these steps can make the difference between a successful implementation and being derailed by unforeseen problems.

Read More »

Tags: , , , , ,

Mobile Security: Actions Speak Louder than Words

Mobile security is a top concern for IT and business leaders. This guest authored blog series with Dimension Data explores how organizational leaders can work together to mitigate concern and implement clearly defined policies to achieve mobility goals. We are pleased to introduce our guest author Darryl Wilson, Director, Enterprise Mobility for Dimension Data Americas, as the first in this series – Darryl will address how a balanced approach to security can yield better business results. 

didata

 

 

dwilson

By Guest Contributor Darryl Wilson

Director, Enterprise Mobility for Dimension Data Americas

Darryl Wilson has more than 15 years of experience overseeing large scale network communications projects both from a technical delivery and pre-sales perspective. Wilson’s areas of expertise include unified communications, network performance, troubleshooting and optimization.

 

The evolution to a mobile-centric workforce has been relatively short, thanks to an explosion of innovation and emerging mobile and cloud technologies. Just a few years ago, BYOD was a hot topic of conversation and mobile device management (MDM) solutions offered a simple way to secure an influx of devices and users.

However, today we are seeing that the tactical implementation of MDM solutions is not enough to control a multi-device, multi-vendor, and multi-OS mobility landscape. In fact, most of the companies I work with are using solutions that have not been optimized or customized for today’s ever-changing mobile world. In addition, security concerns have left many organizations feeling like they need to choose between control and truly reaping the business value mobility offers.

Cisco_DimensionData#1_4.9.14

For example, in a recent Dimension Data Secure Mobility Survey Report, 79% say mobility is a top priority for their organization. However, the report indicates that a much smaller segment of those IT leaders’ actions back it up. Seventy-seven percent of those surveyed believe data is the greatest concern pertaining to mobility, yet only 55% have a mobility roadmap in place. If securing company data and successfully implementing a mobile policy is of such importance, why aren’t more IT leaders taking strategic action?

Read More »

Tags: , , , , , ,