MDM Today and the Future
Mobile devices have quickly become a mainstay in enterprise environments and continue to be consumer driven, and yet they find their way into our day-to-day business lives. As these new devices are being brought into the work environment by employees, enterprise IT is increasingly being forced to accommodate for business use. This is not new news. We observe this pattern through our customers today and live this phenomenon within our own everyday work environment at Cisco. Here at Cisco, employees have the flexibility to choose their device and to securely connect to voice, video and data services from anywhere under an Any Device policy. Cisco manages over 64,000 mobile devices today.
Read More »
Tags: AirWatch, byod, citrix, good, MDM, meraki, Mobile Device Management, mobile security, MobileIron, mobility, SAP Fiberlink, security
When Cisco integrated our Identity Services Engine (ISE) platform with leading mobile device management (MDM) systems, it was clear from the start that we had struck a chord among IT administrators trying to wrestle with the onslaught of employee-owned mobile devices accessing their networks. First and foremost for IT organizations was gaining visibility to all mobile devices — rogue or authorized — that were present on the wireless network. Cisco ISE delivered that capability, providing IT staff with a detailed view of what types of mobile devices were on the network. Coupling that with ISE’s native BYOD enrollment capabilities or the active management capabilities of MDM platforms — as well as network intelligence from the Cisco Wireless Network — was key to gaining full control over this Wild West of mobile devices
Read More »
Tags: AirWatch, byod, Citrix (Zenprise), Fiberlink, Good technology, Identify Service Engine, ISE, MAM, MCMS, MDM, MobileIron, mobility, SAP Afaria, secure BYOD, security
In case you missed it, Network World’s Ellen Messmer published a rather surprising article on how Dell was going to “trump” Cisco in the information security market as a result of some recent acquisitions. Now certainly Dell is entitled to their beliefs. They’re in a difficult position right now, as Michael Dell and Silver Lake maneuver the company through a very complex set of buy-out related transactions. They need to give their customers assurance that they won’t be distracted through this process. And if you want to set a big impression with your customers, you might as well go after the market leader in security. Be it as it may, we can’t just sit back and let these blatant statements go unchecked. So, in the spirit of “fair and balanced” reporting, we thought we’d issue our own little fact check and let you conclude for yourself.
- “Cisco is a great competitor but they don’t have our holistic view” – Acquiring assets and bundling them together doesn’t constitute a “holistic” approach. Those assets must be closely integrated, which is the approach Cisco is delivering with its next generation security architecture. This architecture will be built on top of a multi-function security platform with deep network integration. There are many proof points today that demonstrate we are delivering against this strategy and architecture. Today our customers are deploying Cloud Web Security with their Cisco ISR G2 and ASA Next Generation Firewall through connectors built from Cloud Web Security. In addition we’ve brought market leading application, visibility and control to ASA, embedded deep in the firewall. But it doesn’t stop here.
- Now what about Dell’s comment that Cisco “doesn’t have an identity business“? Cisco’s Identity Services Engine provides the backbone of Cisco’s secure Unified Access solution. The real network security action is in delivering access privileges based on more than just user identity and group which is all Dell can do today with Quest. In the BYOD world customers also require action based on the type of device, posture of the device, and location. Cisco’s Identity Services Engine is the industry leading platform to deliver context based policy controls and then leveraging the network for distributed enforcement consistently across wired, wireless, and VPN access. This is a game-changer for the enterprise and our next generation end-to-end security architecture. Enterprises can now implement context-based policy from the access layer through the data center switching fabric without using brittle and costly network segmentation methods tied to VLANs and ACLs. This is real synergy, and it is delivering a holistic solution as opposed to a holistic press sound bite. But don’t just take our word for it; check out Gartner’s latest Magic Quadrant for NAC. Cisco’s ISE combines identity, device, and network with a market leading platform deployed in over 3000 customers.
- Just weeks ago we announced another key milestone with the introduction of ISE 1.2. With this latest release we also became the first vendor in the industry to offer automated profiling feeds making us better and faster at identifying new devices and operating systems. We’ve increased the speed and scalability of ISE to address the increasing demands brought on by the “Internet of Everything”. And we’ve added a new set of partner APIs enabling integration into key MDM partners – SAP, AirWatch, Citrix, Mobile Iron and Good. This expands the reach of ISE and enables customers to drive common context and identity management from the network all the way to the end point. Dell talk’s about their direction to advance the “concept” of embedded security to virtually any type of device. We’re not just talking about it, we’re doing it. Read More »
Tags: AirWatch, Cisco TrustSec, citrix, cloud, cloud security, dell, Ellen Messmer, Good technology, Internet of Everything, IoE, MDM, Mobile Iron, Network World, next generation firewall, next generaton firewall, nextgen firewall, NNW, SAP, TrustSec
Employees, and many business, want to allow personal devices to be used at work, and potentially for work. However, balancing that with corporate policies for information security, clear rights-of-use, liability, and then bounding it within an acceptable IT cost structure is no small feat. Cisco joined forces with leading MDM vendors to link together a solution that starts at day zero – when an employee first buys a new device and tries to use it at work. It includes self-service onboarding to the network, offering a choice of using a device as a guest or work asset, and forced enrollment in (and compliance with) MDM when business policy must be enforced.
Citrix recently acquired Zenprise to add top-tier MDM to their mobile workspace and application management solution. The good news is Zenprise is an early MDM partner with Cisco, and Citrix inherits the integration work. The tight linkage of Cisco’s Unified Access Solution, and the Cisco Identity Services Engine, to what is now Citrix XenMobile MDM, is a powerful combination for customers to deploy since it brings quite a bit more to the table than standalone MDM.
Tags: citrix, Identity Services Engine, ISE, MDM, Mobile Device Management, mobile device security, mobile devices, unified access, Zenprise
Secure access continues to be paramount for a connected world. People connect to the Internet for business and for personal use, from wired, wireless or mobile devices—locally and remotely. The Internet is a global system of interconnected networks. User devices, the Internet, and all computer networks are the target of a growing number of increasingly complex security threats. Let’s take a look at some recent trends from the Cisco Connected World Technology Report that speaks to the need for secure access:
- Three devices is the average per end user with the desire or mandate to work anywhere and anytime—how do we ensure control of all these devices?
- 71 percent of the next generation workforce will not obey the policies—how do we enforce policy?
- 60 percent will not be responsible for protecting corporate information and devices—how do we protect sensitive data?
- Mobile malware is growing; Android malware grew over 2000% from 2012 but is only 1% of the web malware encounter—how do we ensure secure connection from your mobile device and with web intensive users Read More »
Tags: cisco annual security report, Cisco Identity Service Engine (ISE), cisco live london 2013, Gartner Magic Quadrant, ISE, MDM, NAC, secure BYOD, security policy