Cisco Blogs


Cisco Blog > Mobility

Listen Up! Spotlight on NSA Show & Cisco Podcast Series

As some of you already know, we’ve teamed up with the popular wireless networking podcast “No Strings Attached” to release a mobility podcast series. We’ve recorded 6 podcasts, and counting!

Stay tuned for future podcasts!

Any Cisco wireless technologies you want to learn more about? Let us know on our community.

Tags: , , , , , , , , , , , , , , , , , , , ,

Build Customer Loyalty, Boost Store Revenue

Do you want to increase sales by providing shoppers with the information they need when and where they need it – in your store?

Cisco Connected Mobile Experiences solution can help you do just that. Connected Mobile Experiences is a new solution that helps enable retail organizations to use Wi-Fi location services to deliver engaging store experiences and generate valuable shopper insights.

View this 45-minute on-demand video webcast to learn how to captivate your shoppers with new mobile apps supported by Cisco Connected Mobile Experiences. Discover how real-time location intelligence from your wireless network can enhance customer loyalty, improve store operations, and help you:

  • Deliver a personalized in-store shopping experience that increases customer intimacy
  • Provide important information at critical purchase decision points Read More »

Tags: , , , , , , , , , , , , , , , , , , , , , ,

MSE Blog Series Part 4: wIPS

To continue the MSE Blog Series, I’m going to take you on a journey to dig deep into one of the features of Release 7.4, wIPS!

With the increasing popularity of BYOD, wireless security has become an eminent concern for Network Administrators. Cisco Unified Wireless Intrusion Prevention Solution (WIPS) is dedicated to protecting the wireless network security and provide a secure wireless experience to the clients. Cisco, allied with Flukes Networks, to constantly monitor new wireless intrusion techniques, develop new signatures and provide preventive solutions. In 7.4 release, we added the capability of detecting 802.11 frame fuzzing attacks. The new signatures patterns, for detecting such attacks, are available through WIPS profile configuration in NCS. These signature patterns are enabled by default and provide the full level of security. The user, however, could tune them to get the desired protection level.

wips 1

Read More »

Tags: , , , , , , , , , , , , , , , , , ,

Have you registered for Part 1 of “Activate the IT Transformation with Unified Access” Webinar Series?

This Wednesday, we’re kicking off a great webinar series that will walk you through the Cisco Unified Access solution. With the five-part series, we’re breaking down the one policy, one management, one network story into technical, informative chunks. Part 1 is in just two days, so if you haven’t registered, CLICK TO REGISTER

Read More »

Tags: , , , , , , , , , , , , , , , ,

Activate the IT Transformation with Cisco Unified Access: Part 1

With the ever growing demands placed on IT organizations to “do more with less” it is becoming apparent that the way we deploy the network infrastructure, how we administer policies and how we manage the whole thing needs to evolve.

Why is IT spending so much time maintaining separate wired, wireless and VPN networks? We need to focus on the business that is banging on the door telling you to support more mobile and wired devices, more bandwidth hungry applications and extend that support well beyond the walls of corporate facilities.

How can we simplify how IT operates and still deliver a high-performance, high-quality connected experience? Cisco Unified Access can help! We announced the webinar series earlier this week, and part 1 is just around the corner.

In next Wednesday’s webinar (CLICK TO REGISTER) we will discuss:

  • The industry perspective regarding challenges surrounding, BYOD, Mobility and the Internet of Everything
  • The latest Cisco technology that can help you simplify and optimize you network
  • How a unified access network can improve performance and operations
  • Deploying consistent and contextual policies will improve access control and enforcement
  •  How reducing operational complexity can accelerate device deployment and end user problem resolution.

Read More »

Tags: , , , , , , , , , , , , , , , ,