The industry is going beyond BYOD—it’s not just about simply connecting the device anymore: the mobile landscape has grown to include apps, devices and content, all of which require security and management. This is no easy task. Enterprise mobility management (EMM) is no longer a nice-to-have for our customers—it is a necessity. You need a mobile strategy.
We at Cisco have been steadily building out our mobility portfolio across infrastructure, policy and management over the past few years to provide our customers with what they need to get ahead of the mobile trend.
It has always been Cisco’s strategy to use open API’s with ISE to integrate with host of 3rd party EMM vendors, including Citrix, MobileIron, Airwatch and many more. We are now extending that flexibility to create a cloud-managed EMM offering with our Cisco Meraki solution. The latest addition to the Cisco mobility portfolio, the Cisco Meraki Systems Manager Enterprise is an evolution of Cisco Meraki’s existing MDM cloud offer, and a natural extension of the Cisco Meraki network management solution (e.g. extending management of wireless access points to the management of devices connecting to the enterprise domain).
Cisco is committed to customer choice, and will continue to offer different options to the market, including ecosystem EMM partner solutions. The addition of the Cisco Meraki Systems Manager broadens that portfolio to strengthen our offering and empower our customers attain the mobility solution best suited for their specific requirements.
For more information on the Cisco Meraki Systems Manager, read the full announcement blog here.
Tags: 3rd party, access point, AirWatch, API, App, application, byod, citrix, connect, content, customer, device, emm, Enterprise, Identity Services Engine, infrastructure, ISE, Manage, management, market, MDM, meraki, mobile, mobile device, MobileIron, mobility, network, partner, policy, portfolio, secure, security, solution, system, systems manager, trend, vendor, wi-fi, wifi, wireless
It’s no longer a question of whether mobility best practices and policies are required, it’s a matter of when your strategy will get ahead of the unstoppable trend. Business and IT leaders alike are not just witnessing the movement of everything mobile, but guilty themselves: who isn’t on their devices for both work and play anymore?
User experience, performance, security and management are key red flags that shoot up when we think about mobile. Getting these four totems right will help organizations keep employees or customers happy and productive, while protecting the business. This is no piece of cake: mobility is a journey and you need a strategy.
Thought leaders and innovators across industries are converging on #SuperMobility Mobile Con this week in Vegas to discuss best practices and ways for organizations to tackle these key issues. We’ll be there too to discuss how to move beyond BYOD and develop an enterprise mobility strategy.
Session: Embark on Your Employee and Customer Mobility Journey
Time: Sep. 09, 2014 from 3:30 PM to 4:29 PM
Location: Sands Expo − MobileCON Show Floor, Stage 3 Read More »
Tags: #CTIA2014, #supermobility, App, application, byod, Cisco, client, cloud, collaboration, consumer, customer, device, Enterprise, management, mobile, mobilecon, mobility, network, organization, secure, security, services, solution, strategy, user experience, vegas, wi-fi, wifi, wireless
Location-based services have been getting a lot of attention lately and people are increasingly curious about how Wi-Fi and beacons play together in the hot space that is indoor location technology. In my last blog I reviewed how beacons work and how to differentiate when to use Wi-Fi and beacons. There’ve been some great questions about beacon technology and how it complements Cisco’s location-based Connected Mobile Experiences (CMX) solution, so I want to follow up on these topics with everyone.
What types of beacons are there?
Generally, there are two different classes of beacons: transmit only and backhaul enabled.
Transmit only beacons are exactly as they sound – they simply transmit information to anyone that is capable of hearing (bluetooth enabled smartphones). They do not receive or pass any data or information upstream.
Apple’s iBeacon is the best example of this type of BLE beacon. You can think of them like the navigational beacons used by airplanes when on approach to major airports. The beacon doesn’t even know the plane is there, but the plane is aware of the beacon and knows where the beacon is allowing it to take the correct action. Same is true for smartphones and transmit only beacons like iBeacon – the intelligence is located in the mobile application which must recognize the beacon and take appropriate action.
Backhaul enabled beacons generally include a Wi-Fi chipset for either management or data capabilities. Some backhaul enabled beacons are USB enabled and take advantage of whatever connectivity exists within the PC they are connected. Read More »
Tags: access, analytics, Apple, beacon, BLE, bluetooth, byod, Cisco, cmx, consumer, customer, deployment, device, dimension, Enterprise, GPS, granular, Guest, healthcare, ibeacon, indoor, Indoor location, IT, lbs, line-of-business, location, location based services, marketing, mobility, mse, network, operation, productive, productivity, proximity, retail, sales, tag, technology, track, tracking, wi-fi, wifi, wireless, wlan
This fall your wireless networks will experience many devices upgrading to the new Android 5.0(L-release) and Apple iOS 8 releases (cue: IT managers groan). There have now been many blogs attempting to capture the enhancements expected with these releases. Today I am going to focus on describing how Android L and iOS 8 may affect customers deploying Cisco enterprise grade Wi-Fi networks based upon our research and testing of the Apple seed. Our verdict: Carry on with business as usual.
Here are four features we predict will have the most impact your networks:
1. Chromecast and Google Cast Enhancements (Android L)
Rishi Chandra, the Director of Chromecast Product Management announced that, starting with the Android L release, users have the ability to cast to your neighboring devices such as a TV without having to connect to your Wi-Fi network. In the demo, a phone used the cellular connection to connect to chromecast through the cloud. A variety of techniques are used to authenticate the users in the same room OR use a pin-code as an alternative. Users can Google Cast an ecosystem of applications or even their own applications over any Android or iOS device as well as Cloud based apps on Chrome.
Predicted Impact: Given that this feature works transparently to the Wi-Fi, it is expected that there is no impact on the WLAN in your classrooms or dorm rooms or auditoriums where this will most likely be used.
2. Peer-to-peer AirPlay discovery and playback (iOS 8)
Starting with the iOS 7.1 release, AirPlay devices will discover an AppleTV via the bluetooth network. Users could also secure their AppleTV via a 4 digit pin-code. With the iOS 8 release, Airplay devices can also mirror their content via Airdrop. This feature offers an alternative method for customers to discover and mirroring of Bonjour traffic without accessing the corporate Wi-Fi network.
Predicted Impact: Again this feature operates transparent to the Wi-Fi and therefore customers using this feature should not see any impact on the WLAN. Cisco wireless customers also have the ability to use the Service Discovery Gateway on Cisco IOS based switches, routers or wireless LAN controllers or the Bonjour Services Directory on AireOS controllers. Read More »
Tags: 5.0, 802.11, airdrop, aireOS, airplay, App, Apple, appleTV, application, authenticated, AVC, bluetooth, Bonjour, bonjour services directory, calling, cellular, chrome, chromecast, Cisco, client, client mix, cloud, controller, customer, deployment, enhancement, Enterprise, Google, HDX, health, interference, IOS, ios 8, ios8, LAN, location, mac, mac address, mdns, meraki, messaging, Mission Critical, mse, network, optimized, peer-to-peer, QoS, radio management, release, roaming, Rogue, Service Provider, SP, Voice, wi-fi, wifi, wireless, wlan
In my discussions with security executives who gathered at the recent Gartner Security Summit they recognized that unsecured access to the network is a critical threat vector. However, when leveraged properly, the network itself also provides a significant platform that offers comprehensive protection to close those gaps. What does this mean?
Read More »
Tags: Enterprise, IT, network, security