Cisco Blogs


Cisco Blog > Security

Securing the Future Enterprise

This blog post is part three of a three-part series discussing how organizations can address mobile security concerns through an architectural approach to mobility. The first post discusses how next-gen Wi-Fi models will pave the way for secure mobility. The second post highlights the risks versus the rewards of mobility.

Providing corporate network access via mobile devices is nothing new to today’s IT administrators. However, the future of BYOD and mobility will change as rising generations expect and demand more seamless and secure connectivity. Recently Tab Times editor Doug Drinkwater shared a similar idea: BYOD is still in an early phase with plenty of new challenges and opportunities ahead.

In this last installment of this security and mobility series, I’ll discuss why BYOD policies will change and outline how C-level executives can leverage employees as solution drivers in order to solidify the future of mobility within their organization. Read More »

Tags: , , , , , , , , , , , , , ,

Mobile Security: Is the Risk Worth the Reward?

This blog is part two of a three-part blog series discussing how organizations can address mobile security concerns through an architectural approach to mobility.

In my first post of this three-part series, I discussed how next-gen Wi-Fi models will pave the way for secure mobility and the value of secure Wi-Fi. In this post I’d like to take the mobility conversation a bit further and outline potential risks and rewards that IT departments face when deciding to deploy mobility solutions in our Internet of Everything (IoE) landscape.

A big factor for IT to adopt a mobility strategy with new technology and solutions is weighing the practical risks versus the rewards they stand to gain. A recent ISACA survey of IT professionals offered insight into how employed consumers think and act in terms of security and mobility. The study and ISACA’s 2013 IT Risk/Reward Barometer reveal:

  • Only 4% of those surveyed named the makers of their mobile phone apps as the entity they most trust with their personal data
  • 90% don’t always read privacy policies before downloading apps to their devices

Most of us are familiar with the rewards of mobility, but the belief and behavior gap illustrated by the ISACA survey proves we need to better understand risks of mobility. Read More »

Tags: , , , , , , , , , , , ,

Summary: An Innovative Infrastructure to Capture the Value of the Internet of Everything

The Internet of Everything (IoE) is no longer a prediction. It is reality. As I think about the infrastructure needed to truly capture its value, I immediately think the network needs to be:

  • Agile
  • Intelligent
  • Secure

Why are these qualities a necessity for a thriving programmable infrastructure? Simply, it will allow enterprises to be ready for today’s business needs and tomorrow’s new business models.

Business Insights 12 11 13

Organizations must be able to quickly, intelligently and securely leverage their infrastructure to keep pace with business transformation driven by emerging cloud and mobile technology.

Today’s world is dominated by what Gartner Vice President David Cearley calls the “four powerful forces: social, mobile, cloud and information.” An infrastructure must increasingly demonstrate it can add value to the business, by rapidly and securely rolling out new services, apps and capabilities in a connected world.

Read the full article:  An Innovative Infrastructure to Capture the Value of the Internet of Everything

Tags: , , , , , , , , , , ,

An Innovative Infrastructure to Capture the Value of the Internet of Everything

As the saying goes, the constants in life are death and taxes. We all know there are more than those two, including change and its counterpart, disruption. Business success will result from responsiveness and adaptation that will happen at a rate and with intelligence that we’ve only begun to get our heads around.  And, most CIOs I speak with are asking about how they can adapt and scale their infrastructure to be prepared as the Internet of Things evolves into the Internet of Everything.

Learn how your infrastructure can be intelligent, flexible and secure during constant business transformation. Click on each interactive tile to discover relevant facts.

Learn how your infrastructure can be intelligent, flexible and secure during constant business transformation. Click on each interactive tile to discover relevant facts.

This change brings big implications for IT. The role of IT is changing, in the face of cloud and mobile apps, and the growing understanding that every company is a technology company. From the consumerization of IT to what Gartner Vice President David Cearley calls the “four powerful forces: social, mobile, cloud and information,” IT must increasingly demonstrate it can add value to the business, by rapidly and securely rolling out new services, apps and capabilities in a connected world.

Read More »

Tags: , , , , , , , , , , , ,

When Your Collaboration Infrastructure Starts Making Odd Noises

If your car is overdue for a tune-up, it may let you know in unexpected (and unsettling) ways — rough handling, sluggish acceleration, and even an odd (“that can’t be good”) noise from under the hood. If you’re like me, you don’t want to find yourself waiting on the side of the road for a tow truck. You schedule your car for regular tune-ups to make sure your tires aren’t worn, the wheels are aligned, no fluids are leaking, and the engine is performing to the right specifications.

Just like your car, a collaboration infrastructure needs regular tune-ups. In fact, just like your car, a collaboration infrastructure will let you know that it’s not running optimally. But by the time you actually notice the performance problems with collaboration applications, the odds are that those problems have already started causing issues with your end-users.

Traditionally, optimization has been looked at (even by Cisco in the early days) as the final step in the deployment cycle. But IT projects queue up so fast that optimization for the last project may not happen because the next project is already underway. Today, however, we look at optimization in an Read More »

Tags: , , , , ,