Cisco Blogs


Cisco Blog > Mobility

CMX Connect – An Innovative, Location Aware Guest Captive Portal

connect1With the explosion of smart mobile devices, consumers expect to have Wi-Fi access at pubic venues everywhere they go. Venue owners are under pressure to provide reliable Wi-Fi guest access in a simple and easy way. Wouldn’t it be great to be able to do that AND extract some value out of your investment in setting up the Wi-Fi network as well? Cisco Connected Mobile Experience (CMX) is an industry leading solution provides just that: an easy, customizable and location-aware way to onboard guests using CMX Connect, an ability to gain insights into guest behaviors using CMX Location Analytics and an opportunity to engage guests in meaningful ways using CMX Browser Engage.

With MSE Release 7.6 coming out later this year, we wanted to give you a closer look at new feature CMX Connect.  Read More »

Tags: , , , , , , , , , , , , , , , , , ,

Virtual LANs Can Offer Big Benefits for Small Businesses

Wireless VLANs can boost network security and protect business assets by segmenting traffic

Small business networks don’t have to be basic. In fact, they should apply some advanced networking technologies to their networks to get the same benefits as large enterprises, such as virtual LANs (VLANs). Just like larger companies, smaller businesses can use VLANs to bolster security, increase usability, and improve network performance. And with a wireless VLAN, you can segment wireless traffic on your network into groups that keep certain types of traffic separate from the rest of the traffic on your network.

A LAN is defined as all the devices that connect to each other in the same broadcast domain, whether that’s a wired or a wireless network. A VLAN uses software to create a virtual network of devices that are assigned to a broadcast domain; a wireless VLAN is like a separate, mini network within your wireless LAN. You can set up one or more wireless VLANs to support different groups of users, depending on their needs and the risks inherent to your company.

Read More »

Tags: , , , , ,

Tablets Welcomed: Addressing the top BYOD concern. Security.

Allowing personal devices on the corporate network can make any IT professional cringe. Security is naturally a top concern – and the topic of today’s blog.

One dimension of security is about enabling network access. To do that properly, you would need to design and enforce a mobile device access policy, which may include attributes such as: what the device is, who the user is, where and when access is requested, and the health (posture) of the device. Another dimension of security is about maintaining overall device integrity regardless of the network (corporate or otherwise) it connects to.

In this video we only address the first. Cisco’s solution is based on a newly launched product, the Cisco Identity Services Engine (ISE). Watch the video to learn:

  • What is the Cisco ISE?
  • Can I treat corporate devices differently from personal ones?
  • What about guests in the organization, do I need a separate system?

Read More »

Tags: , , , , , , , , , , , , , , , ,

3 ways to secure guest access to your small business network

You can provide guests with Internet access while ensuring the safety of your company data

I do a fair bit of traveling in my job. When selecting hotels, secure Internet access is one of my top criteria. It’s right up there with a comfy bed and fluffy pillows. I want to know that when I’m using the hotel network, I can access my corporate email or do online banking without having to worry about whether an intruder is prying on my Internet connection. It’s the same when I visit a client site. Clients very kindly let me use their Internet connection, but they want to ensure that I can’t snoop on their corporate network. Read More »

Tags: , , , , ,

Valet: Featuring… Guest Access

Increasing popularity of smartphones, laptops, and other WiFi-enabled devices makes the ability to get online wherever you are a necessity. In public areas, there are often hotposts and other public WiFi networks, but how do you connect when at someone else’s home? And when you host guests, do you ever feel awkward giving out the password to your wireless network?

Read More »

Tags: , , , ,