Cisco Blogs


Cisco Blog > Security

Navigating Security Threats in a Mobile World

Security plays an important role in the success of mobility implementations worldwide. We assume security threats are always present; however, it’s not always apparent where threats may arise from. Being aware of these potential risk areas is crucial.

Since mobility solutions offer users the ability to use devices on a range of networks and in a wide array of places, threats may come in unsuspected ways, or be inadvertently introduced into your enterprises network. For example, one recent study reveals that 80 percent of corporate security professionals and IT leaders recognize that “end user carelessness” constitutes the biggest security threat to an organization.

In addition, information from the Cisco 2014 Annual Security Report sheds light on the persistent security attacks that enterprises face. From hackers to malicious malware, it’s clear that security threats arise from unsuspecting places.

Given this knowledge, business decision-makers must gain insight into where these breaches are occurring. They should also understand why it is important for them to care, and how they can be aided by technical decision-makers to solve these issues moving forward. In this post I’ll discuss the where, the why and the how of embracing a secure approach to enterprise mobility and what it means for business leaders.

Read More »

Tags: , , , , , , , , , , , , ,

Network Programmability Is Real: Five Use Cases for Our Disaster Recovery Cloud Services

SunGard AS has more than 9000 enterprise customers who count on our cloud services and managed services when disaster strikes. Lately, we’ve seen that the “Internet of Everything” is changing customer expectations. Our customers want new types of cloud services—and they want them sooner. They’re also asking to provision and control the services on their own. To keep delivering new products and services, we need a network that’s more flexible, intelligent, secure, and agile than ever before.

Our strategy for the future is to create a platform for service agility by enabling network programming. This is a radical change for our business and our customers. Not having to wait for engineers to program the network will help us bring new services to market sooner. Network programmability will also make it possible to offer new self-service options our customers are requesting, like bandwidth calendaring and service on demand. Read More »

Tags: , , , , , , , , , , ,

Summary: Tackling Mobile Security Risks for Government

As mobility becomes more pervasive, these concepts of cyber crime have become engrained in our work/life culture. These issues have earned national news headlines as governments across the globe grapple with how to build both secure and mobile-enabled infrastructures.

A few weeks ago, Cisco and Mobile Work Exchange released findings from a self-assessment tool that highlights some interesting statistics, enabling us to better understand mobile security best practices and vulnerabilities. The report specifically looks at government employees, 90 percent of whom claim to use at least one mobile device for work, and reveals that many government workers (41 percent) are putting themselves and their agencies at risk. Read More »

Tags: , , , , , , , , , , , , , , ,

Tackling Mobile Security Risks for Government

“Cyber threats. Security breaches. Hacking.”

As mobility becomes more pervasive, these words have become engrained in our work/life culture. The issue of cyber crime has earned national news headlines as governments across the globe grapple with how to build both secure and mobile-enabled infrastructures.

A few weeks ago, Cisco and Mobile Work Exchange released findings from a self-assessment tool that highlights some interesting statistics, enabling us to better understand mobile security best practices and vulnerabilities. The report specifically looks at government employees, 90 percent of whom claim to use at least one mobile device for work, and reveals that many government workers (41 percent)  are putting themselves and their agencies at risk.

Cisco_MobilitySecurity_PatFinn_Final

Here are a few other compelling findings:

  • On mobile devices, 31 percent use a public Wi-Fi connection and 25 percent do not set passwords.
  • 6 percent of government employees who use a mobile device for work say they have lost or misplaced their phone. In the average Federal agency, that’s more than 3,500 chances for a security breach.
  • Despite the Federal Digital Government Strategy, more than one in four government employees have not received mobile security training from their agencies.

Read More »

Tags: , , , , , , , , , , , , , , ,

CiscoLive Milan Highlights: IoE, SDN and a lot of wine

Aside from an ill-timed Milanese taxi strike and a lot of rain and snow, the first CiscoLive of 2014 was a fascinating week. Cisco EVP Rob Lloyd announced our latest Cisco ONE capabilities with a new APIC Enterprise module and the new Inter Cloud capability for moving workload (virtual machines) between private and public clouds.  Both of these announcements underscore Cisco’s expansion into software-defined infrastructure. Now IT administrators can centrally apply policies across data center, WAN and access networks and transparently move workloads and apps across private and public clouds. Now, that’s agility. That’s lower operational costs.

Read More »

Tags: , , , , , , , , , , , ,