Cisco Blogs


Cisco Blog > Collaboration

Summary: A Balanced Approach to Mobile Security

For the benefits of collaboration to be better realized, IT leaders must take a balanced and strategic approach to mobile security that focuses more on protecting the network and proprietary data and less on implementing overly broad restrictions.

Gartner recently made three interesting predictions about mobility in the workplace. And while each of these predictions are compelling – they only offer one-side of the story and the solution:

  1. Twenty percent of BYOD projects will fail by 2016 due to IT’s “heavy hand.”
  2. Strict mobility policies will drive employees to want to isolate personal data from business data.
  3. Mobile browsers will gain market share for app delivery for multiple platforms, and the role of HTML5 in solving issues that arise with the multiple platform problem.

Instead, IT leaders should encourage employees to use secure solutions on devices connected to the network. Managing belief and behaviors of users and deploying a flexible infrastructure that can support an open BYOD policy and mitigate advanced security threats, can have tremendous impact on creating an immersive collaborative environment.

Learn more about how Gartner’s mobility and security predictions can affect the future of collaboration by reading the full blog: A Balanced Approach to Mobile Security.

Tags: , , , , , , ,

A Balanced Approach to Mobile Security

Gartner recently made three interesting predictions about mobility in the workplace. While the ideas are compelling, they only offer one-side of the story, and the solution.

In this blog post, I’ll take a deeper look at each of these predictions and discuss why the future of mobility rests on IT leaders taking a balanced and strategic approach to security that focuses more on protecting the network and proprietary data and less on implementing overly broad restrictions.

Gartner Prediction #1: Twenty percent of BYOD projects will fail by 2016 due to IT’s “heavy hand.”

While the actual failure rate may be less than one-fifth, mobility efforts will fail if companies are too restrictive with MDM policies. Instead, a two-fold approach to supporting a BYOD environment from a security perspective is essential.

First, IT leaders should take a balanced approach to security that protects business-imperative network solutions and data. In most cases, blocking Angry Birds and Candy Crush is unnecessary and not scalable. With Apple and Google supporting over a million apps each (and counting), it can cost precious time and IT resources just trying to keep up with restricting non-threatening applications.

Secondly, IT leaders should be focused on encouraging users to use secure solutions. This will only grow more important as the explosion of new connections and various devices evident in today’s Internet of Everything world creates more opportunity for malicious actors to utilize even more inroads to compromise users, networks, and data. By educating employees to take an active role in the security of their device, users can be empowered to report suspicious threats and have an open dialogue with IT teams. Read More »

Tags: , , , , , , , , , , , ,

Summary: Next Gen IT Predictions: 2014 and Beyond

2014 will be a year that builds on the momentum of mobile, cloud, the Internet of Things (IoT) and the Internet of Everything (IoE). How can your organization realize value from today’s new model for IT?

Here’s my take on the trends we will see over the next twelve months:

  1. Increasing urgency to manage our zettabyte-driven world.
  2. The need for hybrid cloud adoption.
  3. A revolution in software and new IoE platforms.
  4. The rise in thinking about security holistically.
  5. The Internet of Me finally arrives: real personalized, mobile, cloud-based experiences.
  6. The Internet of Everything is happening now.

If you think technology has infiltrated your life, just wait. You can feel the potential for monumental change as we begin to interconnect the physical and virtual worlds.

Read the full blog: Next Gen IT Predictions: 2014 and Beyond to learn more about each trend and discover how your organization can realize the benefits of the Internet of Everything.

Next Gen IT Predictions : 2014 and Beyond from Cisco Business Insights

 

Tags: , , , , , , , , , , , ,

Next Gen IT Predictions: 2014 and Beyond

In my travels, I am fortunate to see new and interesting innovations, emerging technologies and trends. Of course, the growth of mobile and cloud technologies continues to shape our work and lives. 2014 will be a year that builds on the momentum of these trends, along with IoT, with more connected people, processes data and things than ever before.  Here’s my take on the most significant things we’ll see in 2014.

Next Gen IT Predictions : 2014 and Beyond from Cisco Business Insights

 

1. Increasing urgency to manage our zettabyte-driven world.

The proliferation of mobile devices, streaming video and explosion of applications has meant that global IP traffic has exploded more than 4x in the past 5 years. IP traffic will again triple over the next 5 years. In 2013, we generated a momentous 1.2 zettabytes of new information and 70 billion apps were downloaded. Wireless traffic will exceed wired traffic and video-on-demand traffic will nearly triple in three years.

Read More »

Tags: , , , , , , , , , , , ,

Securing the Future Enterprise

This blog post is part three of a three-part series discussing how organizations can address mobile security concerns through an architectural approach to mobility. The first post discusses how next-gen Wi-Fi models will pave the way for secure mobility. The second post highlights the risks versus the rewards of mobility.

Providing corporate network access via mobile devices is nothing new to today’s IT administrators. However, the future of BYOD and mobility will change as rising generations expect and demand more seamless and secure connectivity. Recently Tab Times editor Doug Drinkwater shared a similar idea: BYOD is still in an early phase with plenty of new challenges and opportunities ahead.

In this last installment of this security and mobility series, I’ll discuss why BYOD policies will change and outline how C-level executives can leverage employees as solution drivers in order to solidify the future of mobility within their organization. Read More »

Tags: , , , , , , , , , , , , , ,