Cisco IT has always strived to improve the user experience. It is often overlooked in some IT organizations, but Cisco IT has service managers who are held accountable for the feedback they get for their service sectors. This focus on how we perform means we are constantly pushed to improve how users interact with the technology. Read More »
The industry is going beyond BYOD—it’s not just about simply connecting the device anymore: the mobile landscape has grown to include apps, devices and content, all of which require security and management. This is no easy task. Enterprise mobility management (EMM) is no longer a nice-to-have for our customers—it is a necessity. You need a mobile strategy.
We at Cisco have been steadily building out our mobility portfolio across infrastructure, policy and management over the past few years to provide our customers with what they need to get ahead of the mobile trend.
It has always been Cisco’s strategy to use open API’s with ISE to integrate with host of 3rd party EMM vendors, including Citrix, MobileIron, Airwatch and many more. We are now extending that flexibility to create a cloud-managed EMM offering with our Cisco Meraki solution. The latest addition to the Cisco mobility portfolio, the Cisco Meraki Systems Manager Enterprise is an evolution of Cisco Meraki’s existing MDM cloud offer, and a natural extension of the Cisco Meraki network management solution (e.g. extending management of wireless access points to the management of devices connecting to the enterprise domain).
Cisco is committed to customer choice, and will continue to offer different options to the market, including ecosystem EMM partner solutions. The addition of the Cisco Meraki Systems Manager broadens that portfolio to strengthen our offering and empower our customers attain the mobility solution best suited for their specific requirements.
For more information on the Cisco Meraki Systems Manager, read the full announcement blog here.
Tags: 3rd party, access point, AirWatch, API, App, application, byod, citrix, connect, content, customer, device, emm, Enterprise, Identity Services Engine, infrastructure, ISE, Manage, management, market, MDM, meraki, mobile, mobile device, MobileIron, mobility, network, partner, policy, portfolio, secure, security, solution, system, systems manager, trend, vendor, wi-fi, wifi, wireless
When it comes to delivering better business outcomes, many IT people could be sitting on a virtual goldmine – particularly when it comes to location analytics. Here are some new ways that you can extract more of that valuable information from your network, and some things to think about as you add new services and capacity.
Smart mobile device users are always looking to access information as they enter any public or private space. If you oversee IT for a shopping center, a hotel, a university or some other large venue, you know that every mobile device user can be an opportunity to:
- Engage customers in new ways: Deliver relevant content, information, and services directly to customer’s mobile devices based on their location or personal preferences.
- Understand customer behavior: Many organizations are not able to efficiently track the number of visitors, dwell time, or movement patterns. Imagine how much you could address visitor needs by gaining these insights.
- Create new advertising revenue streams: Monetize your Wi-Fi infrastructure through third-party mobile advertising opportunities and mobile-influenced sales.
How can you make the most of this opportunity and connect with visitors to improve experiences, increase customer loyalty and drive sales?
In the past, a critical component of preventing threats was understanding and controlling network access and access to network resources based on role, while also denying access for unauthorized users and devices.
However, assuring this secure network access has been increasingly difficult due to:
- Complexity in understanding more than just who, but how, by what, when and from where users and devices attempt to access network resources
- Complexity in connecting authorized users to needed services with the explosion of both on premise and remote devices used by a single user
- Complexity in evolving network architectures where networks have become more “flat” and difficult to manage from a security standpoint
- Complexity in unifying the number of disparate security systems that need to be configured, managed and visualized
These various aspects of security complexity challenge security practitioners with delivering the right services and purchasing the right solutions to not just handle the complexity, but also reduce it. However, when we take a look at IT security spending, where does the majority of investment go and where do most vendors siphon their money to and why?
If you look across the entire attack continuum, there are three phases that people need to focus on when dealing with threats and attacks: before an attack happens, during the time it is in progress, and even after the damage is done. To properly protect against threats in all stages, organizations need to reinvestigate their security to gain visibility and control across these three phases in order to truly reduce risk.
As I’ve described in my previous blogs and documents, the first capability deployed by Cisco IT for Identity Services Engine (ISE) is guest networking. Guest networking replaced an older existing solution, referred to internally as NextGen Guest Networking (NGGN). NGGN relied on about 12 servers globally and had a large access control list (ACL) to manage. Deploying guest networking on ISE is a logical first choice for three reasons: Read More »