Cisco Blogs


Cisco Blog > Security

Securing Any Device—For the Exceptional Connected Experience

February 11, 2013 at 4:23 pm PST

Secure access continues to be paramount for a connected world. People connect to the Internet for business and for personal use, from wired, wireless or mobile devices—locally and remotely. The Internet is a global system of interconnected networks. User devices, the Internet, and all computer networks are the target of a growing number of increasingly complex security threats. Let’s take a look at some recent trends from the Cisco Connected World Technology Report that speaks to the need for secure access:

  • Three devices is the average per end user with the desire or mandate to work anywhere and anytime—how do we ensure control of all these devices?
  • 71 percent of the next generation workforce will not obey the policies—how do we enforce policy?
  • 60 percent will not be responsible for protecting corporate information and devices—how do we protect sensitive data?
  • Mobile malware is growing; Android malware grew over 2000% from 2012 but is only 1% of the web malware encounter—how do we ensure secure connection from your mobile device and with web intensive users   Read More »

Tags: , , , , , , , ,

Cisco Unified Access: Helping Partners Reduce Complexity and Maximize Productivity

Today, Cisco announced the latest additions to our Unified Access portfolio to enable One Network for wired and wireless access. I’m personally excited about this because it is finally closing a loop we started a year ago when we introduced Cisco Unified Access with One Policy, One Management, One Network. Now Cisco and partners can offer a truly converged wired and wireless experience.

Let’s take a look at what’s new and how these solutions present an excellent opportunity for you to help meet your customers’ needs.

What is being launched? Read More »

Tags: , , , , , , , , , ,

Demystifying the Catalyst: IOS Device Sensors

In this blog, let us take a look at how Catalyst access switches profile the various connected devices and make the information available to various network services.

Many devices like laptops, IP phones, cameras etc. are connected to the network and need to be managed by IT for asset management, device onboarding, switch configuration, policy management & device energy management. Traditionally, IT administrators manually added each device for each service. This consumes unnecessary overhead and is an inefficient use of IT’s time. Read More »

Tags: , , , , , , , , , ,

Cisco NRF 2013 – Preview of Cisco BYOD Demonstration

This is our third preview of what Cisco will be showcasing at the 102nd National Retail Federation Convention and Expo on January 14 and 15, 2013 in New York City. We’ll be showcasing Cisco Bring-Your-Own-Device (BYOD) Smart Solution and see the technology that enables you to support mobile access that’s both easy and secure. Come learn how you can improve employee productivity and customer service with a highly secure BYOD environment. Please watch this video about the BYOD demonstration and then mark your calendar to join us at Cisco Booth #252 at NRF 2013. I look forward to seeing you there!

Tags: , , , , ,

Securing the New Workspace

September 24, 2012 at 7:30 am PST
  • 100% IT is struggling to keep up with mobility trends
  • Mobile threats have doubled from 2010 to 2011
  • Around four in ten American users are likely to click on an unsafe link

And with all of these changing dynamics, user expectations continue to rise while the risk of security vulnerabilities rises. Yet, one of the expectations is a demand for safe access to essential business productivity and collaboration applications from anywhere, on any device (personal or organization acquisition), along with a consistent experience across multiple device types. This is the new workspace.

So, how do recent data center security enhancements play an important role in an ever more mobile and Bring-Your-Own-Device (BYOD) reality?  The reality of the ever-increasing proliferation of devices for each user gives rise to a need for increased scalability and security in the data center even more evident. Users who bring their own device expect a good experience accessing the applications that reside in the data center.  IT wants to ensure that applications delivered from the data center or internally are appropriately accessed and protected from any malicious actions. Securing a mobile and BYOD environment does not simply start at the endpoint; it must take an architectural approach from endpoint traffic traversing through the network to the data center.  Cisco takes a comprehensive approach to securing applications, content, and devices delivered to any workspace, in any location, based on type and posture, location and time, and user’s role—ensuring an uncompromised user experience and giving your employees the freedom to be highly productive.

Read More »

Tags: , , , ,