Cisco Blogs


Cisco Blog > Mobility

Cisco Meraki Systems Manager Extends Enterprise Mobility Management to the Cloud

The industry is going beyond BYOD—it’s not just about simply connecting the device anymore: the mobile landscape has grown to include apps, devices and content, all of which require security and management. This is no easy task. Enterprise mobility management (EMM) is no longer a nice-to-have for our customers—it is a necessity. You need a mobile strategy.

We at Cisco have been steadily building out our mobility portfolio across infrastructure, policy and management over the past few years to provide our customers with what they need to get ahead of the mobile trend.

It has always been Cisco’s strategy to use open API’s with ISE to integrate with host of 3rd party EMM vendors, including Citrix, MobileIron, Airwatch and many more. We are now extending that flexibility to create a cloud-managed EMM offering with our Cisco Meraki solution.  The latest addition to the Cisco mobility portfolio, the Cisco Meraki Systems Manager Enterprise is an evolution of Cisco Meraki’s existing MDM cloud offer, and a natural extension of the Cisco Meraki network management solution (e.g. extending management of wireless access points to the management of devices connecting to the enterprise domain).

Cisco is committed to customer choice, and will continue to offer different options to the market, including ecosystem EMM partner solutions. The addition of the Cisco Meraki Systems Manager broadens that portfolio to strengthen our offering and empower our customers attain the mobility solution best suited for their specific requirements.

For more information on the Cisco Meraki Systems Manager, read the full announcement blog here.

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

Improve Your Business Results with Mobility and Analytics

When it comes to delivering better business outcomes, many IT people could be sitting on a virtual goldmine – particularly when it comes to location analytics. Here are some new ways that you can extract more of that valuable information from your network, and some things to think about as you add new services and capacity.

Smart mobile device users are always looking to access information as they enter any public or private space. If you oversee IT for a shopping center, a hotel, a university or some other large venue, you know that every mobile device user can be an opportunity to:

  • Engage customers in new ways: Deliver relevant content, information, and services directly to customer’s mobile devices based on their location or personal preferences.
  • Understand customer behavior: Many organizations are not able to efficiently track the number of visitors, dwell time, or movement patterns. Imagine how much you could address visitor needs by gaining these insights.
  • Create new advertising revenue streams: Monetize your Wi-Fi infrastructure through third-party mobile advertising opportunities and mobile-influenced sales.

How can you make the most of this opportunity and connect with visitors to improve experiences, increase customer loyalty and drive sales?

Marlowe Mall

Read More »

Tags: , , , , ,

Part 1: Why Is Enabling Only Authorized Users So Complex?

In the past, a critical component of preventing threats was understanding and controlling network access and access to network resources based on role, while also denying access for unauthorized users and devices.

However, assuring this secure network access has been increasingly difficult due to:

  • Complexity in understanding more than just who, but how, by what, when and from where users and devices attempt to access network resources
  • Complexity in connecting authorized users to needed services with the explosion of both on premise and remote devices used by a single user
  • Complexity in evolving network architectures where networks have become more “flat” and difficult to manage from a security standpoint
  • Complexity in unifying the number of disparate security systems that need to be configured, managed and visualized

These various aspects of security complexity challenge security practitioners with delivering the right services and purchasing the right solutions to not just handle the complexity, but also reduce it. However, when we take a look at IT security spending, where does the majority of investment go and where do most vendors siphon their money to and why?

If you look across the entire attack continuum, there are three phases that people need to focus on when dealing with threats and attacks: before an attack happens, during the time it is in progress, and even after the damage is done. To properly protect against threats in all stages, organizations need to reinvestigate their security to gain visibility and control across these three phases in order to truly reduce risk.

Read More »

Tags: , ,

The Evolution of Guest Networking

As I’ve described in my previous blogs and documents, the first capability deployed by Cisco IT for Identity Services Engine (ISE) is guest networking. Guest networking replaced an older existing solution, referred to internally as NextGen Guest Networking (NGGN). NGGN relied on about 12 servers globally and had a large access control list (ACL) to manage. Deploying guest networking on ISE is a logical first choice for three reasons:  Read More »

Tags: , , , , , , ,

Cisco IT’s Identity Services Engine Deployment: Project Planning, Personnel, and Progress

Several customers have asked me how Cisco IT does project planning for a large enterprise deployment such as the Identity Services Engine, or ISE. What’s our approach? How do we manage operational costs? How do we measure performance? What personnel are involved throughout the process?  Read More »

Tags: , , , , ,