Cisco Blogs


Cisco Blog > Mobility

Latin America Insights: Keeping Your Organization Safe in a Mobile World

The power of mobility has transformed the IT landscape.

While mobility and other tech forces, such as cloud and big data, have enabled organizations to improve productivity and increase efficiency, the constant challenge of keeping data, assets and users secure continues to be a top concern for CIOs and CSOs.

And these concerns stretch across global borders. For example, Frost & Sullivan analysts predict a $1.1B investment towards IT security in Latin America by 2015.

Today, security is no longer an expense, but a necessity for moving forward. It’s an investment for the future longevity of any company. With this in mind, how can business and IT leaders keep their organizations safe in a mobile world? And what can we learn from the mobile security adoption we are seeing in Latin America?

Recently, I had a chance to participate in a new Future of Mobility podcast with Frost & Sullivan Research Analyst, Bruno Tasco, to discuss the answers to some of these questions and how organizational leaders can address security in a way to reap the benefits of true mobility. The podcast is available for download in Spanish and Portuguese and a summary in English can be found on iTunes.

Here are a couple of considerations for CIOs and CSOs as they evaluate their mobile security strategies and look to future-proof their business.

Prepare for Fast Changes

Talking about mobility or general mobility in our Latin America market is like talking about the past. According to the Cisco Visual Networking Index (VNI), Latin America is experiencing and will continue to see incredible mobile adoption. Read More »

Tags: , , , , , , , , , ,

Securing Mobile Data: What’s Your Plan?

July 24, 2014 at 7:00 am PST

As a business or technical leader, you know you need to protect your company in a rapidly evolving mobile ecosystem. However, threats are not always obvious. As malware and attacks become more sophisticated over time, business decision makers must work with technical decision makers to navigate security threats in a mobile world.

This blog series, authored by Kathy Trahan, will explore the topic of enterprise mobility security from a situational level and provide insight into what leaders can do now to mitigate risk. To read the first post focused on securing device freedom, click here. The second post, available here, focused on the risks that come with mobile connections. – Bret Hartman, Chief Technology Officer (CTO) for Cisco’s Security Technology Group

The Cisco Visual Networking Index revealed an obvious truth that none of us can deny—mobile data traffic is on the rise and shows no signs of stopping:

  • By 2018, over half of all devices connected to the mobile network will be “smart” devices
  • Tablets will exceed 15 percent of global mobile data traffic by 2016
  • By the end of this year, the number of mobile-connected devices will exceed the number of people on earth, and by 2018, there will be nearly 1.4 mobile devices per capita

With the explosion in the number of smart mobile devices and employees increasingly taking advantage of BYOD, securing company and personal data in a world where the mobile endpoint is a new perimeter presents technical and legal challenges for organizational leaders.

What are some of the most prevailing challenges? The personal use of company-owned devices happens more frequently than IT may realize and a complex legal environment can leave both employees and IT confused on how personal privacy is being protected. It is important for human resources to weigh in here as well.

Read More »

Tags: , , , , , , ,

The Risk of Remote Connection: What’s Your Plan?

July 17, 2014 at 6:00 am PST

As a business or technical leader, you know you need to protect your company in a rapidly evolving mobile ecosystem. However, threats are not always obvious. As malware and attacks become more sophisticated over time, business decision makers must work with technical decision makers to navigate security threats in a mobile world.

This blog series, authored by Kathy Trahan, will explore the topic of enterprise mobility security from a situational level and provide insight into what leaders can do now to mitigate risk. To read the first post focused on securing device freedom, click here. – Bret Hartman, Chief Technology Officer (CTO) for Cisco’s Security Technology Group

Imagine two of your executives are using a SaaS platform while working off an unsecure hotel Wi-Fi network nearby. Did you know that SaaS and B2B applications are 15 times more likely than pornography to deliver malicious content across a network?

The threats against a remote connection are unfortunately very real and using an unprotected network to access company assets (whether on-premise or in the cloud) can have serious consequences.

As the growth of mobility and cloud blur the lines of our personal and business lives, the “mobile cloud” has drawn users (consumer or employee) to its convenience. According to a recent Gallup poll, nearly 80% of workers had positive feelings for using their own computers and mobile devices to stay connected to work outside of normal business hours.

For IT, the mobile cloud offers huge management efficiencies. Recent Cisco mobility research confirms that mobility strategies are converging with cloud strategies. However, it also forces IT and business leaders to find a happy medium between encouraging corporate productivity and addressing a new wave of security concerns. From the same research, nearly half of the organizational leaders surveyed say security risks can prevent them from moving forward with mobility initiatives.

Despite these risks, It is hard to dispute that off premise access provides significant productivity gains especially as organizations see mobility as a competitive edge to embrace.

As more mobile users enter the market, (over half a billion devices were added just last year) and the number of remote workers becomes more ubiquitous, the expectation is that networks and access should be the same, regardless of location.

Read More »

Tags: , , , ,

The Converging IT Landscape

With networks getting faster and the whole world going mobile, the number of connections is growing at an unprecedented rate. By next year, the amount of mobile-connected devices will exceed the number of people on the planet, and by 2020, will reach 50 billion. And those devices are getting smarter all the time.

While there is no doubt that mobility, cloud and big data are each enabling business transformation, imagine what they could do collectively. That’s the power of convergence, and it’s revolutionizing the IT and business landscape.

This convergence brings together applications, systems and processes to help meet current needs while preparing for future innovation. It’s at the heart of the Internet of Everything (IoE) in connecting people, process, data and things in new and innovative ways. And mobility is a driving force fuelling this evolving landscape, breaking down barriers and enabling the birth of entirely new kinds of business and economic models.

Mobility: A Cornerstone in the Converging IT LandscapeFuture of Mobility_v1-2

Mobile devices are already a pervasive part of our lives. As mobility continues to evolve, these devices will be primarily how a network connects to the user, helping shape and customize the end-user experience to deliver more personalized services and real-time engagement.

Imagine you are an online shopper who doesn’t want to wait overnight for your shipment. You want your product now. From your mobile device, you will not only be able to price-match with other retailers and see if the product is available in a store near you (a current capability), but also connect with real-time data in the cloud over an agile network to see if there are checkout lines in the store, reserve a parking spot, and tell the customer service rep you are on your way.

Gartner predicts that, through this year, mobile apps will drive “the next evolution in user experience” by “leverage[ing] intent, inferred from emotion and actions, to motivate changes in end-user behavior.” This is already happening through smart devices and wearables, for example, as people (myself included) use health and fitness apps to help make better, healthier choices.

Read More »

Tags: , , , , , , ,

Securing Employee Device Freedom

As a business or technical leader, you know you need to protect your company in a rapidly evolving mobile ecosystem.

However, threats are not always obvious. As malware and attacks become more sophisticated over time, business decision makers must work with technical decision makers to navigate security threats in a mobile world.

I’m excited to introduce a new blog series, authored by Kathy Trahan, which will explore the topic of enterprise mobility security from a situational level and provide insight into what leaders can do now to mitigate risk.

This first post will discuss the security concerns presented by the rapid-fire growth of BYOD (Bring Your Own Device) and how implementing specific policies can help organizations reap the benefits of true mobility now and in the future.

Kathy Trahan Senior Security Solutions Marketing Manager Global Marketing Corporate Communications

Kathy Trahan
Senior Security Solutions Marketing Manager

With the increasing amount of tablets, wearables, and other connected “things” in the workplace, it’s no wonder that the BYOD trend is causing a dynamic shift in security policies and protocol.

This heightened focus on security only increases when the security threat evolution shows that attackers seem to stay one step ahead of the security measures in place to stop them. And while the BYOD movement does present special challenges to ensuring data security, it also affords BDMs and TDMs an opportunity to collaborate and come up with security solutions that balance the need to secure company assets while still allowing employees to conduct business on devices that are familiar and comfortable to them.

As enterprises look for ways to improve productivity, efficiency, and flexibility for their workforces, mobility has become a key factor. A Gartner survey predicts that by 2017, half of employers will require their employees to provide their own devices for work purposes. And as use of and reliance on mobility increase, so does the need for security policies that allow employees to function in a work world that extends beyond their cubicle and office walls.

Read More »

Tags: , , , , , ,