As mobility becomes more pervasive, these concepts of cyber crime have become engrained in our work/life culture. These issues have earned national news headlines as governments across the globe grapple with how to build both secure and mobile-enabled infrastructures.
A few weeks ago, Cisco and Mobile Work Exchange released findings from a self-assessment tool that highlights some interesting statistics, enabling us to better understand mobile security best practices and vulnerabilities. The report specifically looks at government employees, 90 percent of whom claim to use at least one mobile device for work, and reveals that many government workers (41 percent) are putting themselves and their agencies at risk. Read More »
Tags: architecture, Cisco, CiscoMobility, future of mobility, infrastructure, mobile, mobile device, Mobile Government, mobile security, mobile workspace, mobility security, network, security, wi-fi, wifi, wireless
“Cyber threats. Security breaches. Hacking.”
As mobility becomes more pervasive, these words have become engrained in our work/life culture. The issue of cyber crime has earned national news headlines as governments across the globe grapple with how to build both secure and mobile-enabled infrastructures.
A few weeks ago, Cisco and Mobile Work Exchange released findings from a self-assessment tool that highlights some interesting statistics, enabling us to better understand mobile security best practices and vulnerabilities. The report specifically looks at government employees, 90 percent of whom claim to use at least one mobile device for work, and reveals that many government workers (41 percent) are putting themselves and their agencies at risk.
Here are a few other compelling findings:
- On mobile devices, 31 percent use a public Wi-Fi connection and 25 percent do not set passwords.
- 6 percent of government employees who use a mobile device for work say they have lost or misplaced their phone. In the average Federal agency, that’s more than 3,500 chances for a security breach.
- Despite the Federal Digital Government Strategy, more than one in four government employees have not received mobile security training from their agencies.
Read More »
Tags: architecture, Cisco, CiscoMobility, future of mobility, infrastructure, mobile, mobile device, Mobile Government, mobile security, mobile workspace, mobility, network, security, wi-fi, wifi, wireless
Aside from an ill-timed Milanese taxi strike and a lot of rain and snow, the first CiscoLive of 2014 was a fascinating week. Cisco EVP Rob Lloyd announced our latest Cisco ONE capabilities with a new APIC Enterprise module and the new Inter Cloud capability for moving workload (virtual machines) between private and public clouds. Both of these announcements underscore Cisco’s expansion into software-defined infrastructure. Now IT administrators can centrally apply policies across data center, WAN and access networks and transparently move workloads and apps across private and public clouds. Now, that’s agility. That’s lower operational costs.
Read More »
Tags: Cisco, cloud, Fast IT, infrastructure, infrastructure programmability, Internet of Everything, IoE, IoT, mobility, network, Network programmability, SDN, software defined
As Wi-Fi continues to be the primary mode of access, enterprise Unified Communication(UC) applications usage is increasing with smartphones, tablets and laptops.
Customers are asking, is there anything I can do to prioritize Jabber or Lync traffic over others or even identify how much of the traffic is really collaboration traffic vs. other types of media. The recently introduced Wireless Release 7.6 enhances the ability to classify Microsoft Lync 2013 and Jabber with Cisco WLAN Infrastructure.
In the first blog about Application Visibility and Control over Cisco WLAN, I captured what is AVC and the capabilities included in the release 7.4. In a subsequent blog, I had captured a success story about a customer who benefited from the reliability by deprioritizing scavenger level applications as well as captured highlights of the enhancements in release 7.5. This blog captures how the release 7.6 allows popular collaboration applications to be accurately classified and prioritized as well as provides a teaser to some of the innovations that can be expected in the future.
What exact capabilities AireOS 7.6 provide ?
The protocol pack 6.3 introduced in AireOS 7.6 allows you to identify and prioritize not just Jabber but also sub-classify Cisco Jabber Audio, Cisco Jabber IM and Cisco Jabber Video. Customers may want to prioritize the Cisco Jabber Audio as the highest priority while the others may be lower priority. Similarly you can classify not just Microsoft Lync but also Microsoft Lync Audio, rtcp and Microsoft Lync Video and thereby prioritize them separately. Read More »
Tags: aireOS, App, Apple, application, AVC, beta code, certification, classify, collaboration, communication, control, controller, dropbox, ESPN, infrastructure, innovation, jabber, lync, media, Microsoft, NBAR, NBAR2, Outlook, packet size, protocol, protocol pack, qq, release 7.6, rtcp, traffic, UC&C, unified communications, user, video, visibility, webgui, whatsapp, wi-fi, wifi, wireless, wlan, WLC
Earlier this week, we announced the Cisco Domain Ten framework 2.0, enhanced by great input from customers, partners, and Cisco’s well-earned experience of strategizing and executing IT transformation.
The enhanced Cisco Domain Ten framework helps customers drive better strategic decisions, providing greater focus on business outcomes, providing deeper analysis of hybrid cloud implications, and extending the framework beyond data center and cloud to include all IT transformation initiatives.
You may have read Stephen Speirs earlier blogs about Cisco Domain Ten for cloud transformation. Today, let’s look at key changes in the Cisco Domain Ten framework 2.0 from the original version. These changes have been adopted to enhance discussions on three themes:
- Highlight importance of public clouds as part of IT transformation and solutions using IaaS, PaaS, and SaaS within the data center and across the entire business.
- Addition of “Organization” in Domain 10 to bring together the business and technology focus for strategy discussions.
- Name changes for some domains to facilitate ease of alignment and discussion on overall IT transformation across multiple architectures and technology solutions such as ITaaS, collaboration, mobility, video, etc. for both enterprise and provider perspectives.
Read More »
Tags: application, automation, catalog, cloud application, Cloud Computing, compliance, customer interface, data center, Domain 10, Domain Ten, financial, Governance, infrastructure, IT Tranformation, organization, platform, process, security, strategy, virtualization