Secure access continues to be paramount for a connected world. People connect to the Internet for business and for personal use, from wired, wireless or mobile devices—locally and remotely. The Internet is a global system of interconnected networks. User devices, the Internet, and all computer networks are the target of a growing number of increasingly complex security threats. Let’s take a look at some recent trends from the Cisco Connected World Technology Report that speaks to the need for secure access:
- Three devices is the average per end user with the desire or mandate to work anywhere and anytime—how do we ensure control of all these devices?
- 71 percent of the next generation workforce will not obey the policies—how do we enforce policy?
- 60 percent will not be responsible for protecting corporate information and devices—how do we protect sensitive data?
- Mobile malware is growing; Android malware grew over 2000% from 2012 but is only 1% of the web malware encounter—how do we ensure secure connection from your mobile device and with web intensive users Read More »
Tags: cisco annual security report, Cisco Identity Service Engine (ISE), cisco live london 2013, Gartner Magic Quadrant, ISE, MDM, NAC, secure BYOD, security policy
Several years ago, I had a conversation with an IT manager about his company’s network security that I still remember today. He said: “We’re losing our battle over internal network security. We cannot keep up with our vendors and contractors who bring in all kinds of devices to our network. We may turn our internal network into a DMZ.” Turning an internal network into a DMZ was probably an extreme case at that time but it showed the underlying problem: if you don’t have control over what’s happening on your network, you’ll have an uphill battle in your hands.
Today, the challenge has intensified due to the bring-your-own-device (BYOD) trend. There are speculations that corporate networks may eventually turn out to be the equivalent of college networks where users routinely bring their own personal devices. Because personal devices generally do not have the same level of security as IT-owned assets, they tend to have more vulnerabilities and it’s harder to protect sensitive information and intellectual property on these devices. The adage, “security risks walk in the door with employees” is quickly becoming a reality that organizations must address.
Read More »
Tags: 802.11ac, Bring your Own Device (BYOD), byod, DMZ, enterprise network, MDM, Mobile Device Management, UA, unified access
I attended MobileCon 2012, the newly branded CTIA enterprise and application event, earlier this month. I noticed the common theme this year was MDM-BYOD-Cybersecurity. Given the recent McKinsey report that indicated 77 percent of CIOs today state that they will allow some form of consumerization in the coming few years, IT professionals are challenged to increase flexibility without compromising security
Throughout the event, I heard many BYOD case studies with a huge interest/following in data and metrics. On this theme, I thought our own Cisco BYOD case study that we have been sharing with our customers would be of interest to this community.
Note, I will provide updated numbers soon as my peers continue to seek out the latest and greatest mobile devices here in the center of Silicon Valley.
For Cybersecurity, I’d like to follow up on John Stewart’s thoughts from yesterday. October is National Cybersecurity Awareness Month, and the joint-task theme between public and private industries resonated across the show. On this note, Cisco is one of the contributors in CTIA’s recently released Cybersecurity Whitepaper.
In my next few blogs, I want to share interesting facts I’m calling, “Did U Know Data for Mobile Security.” The first fact comes from Osterman Research, Inc. for Azaleos.
“The leading factor (34%) cited for deploying an MDM solution was the potential for loss of intellectual property.”
Tags: bring your own device, byod, cyber, cybersecurity, MDM, Mobile Device Management, mobile devices, mobilecon, STIA
So you think you know what BYOD is? Think again!
Cisco Cius - Not BYOD since it's Corporate provisioned.
If you’re a manufacturer you’ve probably heard of BYOD, or ‘Bring Your Own Device’. You know that more and more devices are proliferating throughout the organization. You also know that security is a big issue: How do you stop folks accessing sensitive systems, how do you protect Intellectual Property, and how do you prevent a disastrous shutdown caused by a device either intentionally or unintentionally?
Well, these are only some of the issues – and they’re rarely addressed by a ‘Good-Enough Network’. Cisco’s BYOD is different – it looks at the whole picture. It’s not just about your wireless network – although the Cisco offerings are better than most! It’s about an holistic approach to BYOD. That covers the plant, IT, the LAN and fixed wired network and the wireless network too. All aspects.
As my colleague, Katie Taylor, says in her blog: Read More »
Tags: access point, beyond byod, bring your own device, Bring your Own Device (BYOD), byod, CIO, cisco byod, enterprise mobility, Manufacturing, MDM, Mobile Device Management, mobile devices, network management, vpn, wi-fi, wireless, wireless access points, wireless LAN, wlan
With more than seven billion souls set to tote 10 billion mobile-connected devices by 2016, mobility has not just arrived, it’s taken over our schools, businesses and personal lives.
Just ask Mitch Davis, the CIO of Bowdoin College, a private liberal arts college in Maine. Before BYOD ever became a global IT trend, according to Mitch, the vast majority of college students were already bringing their personal devices into the campus environment.
These co-eds expected Bowdoin to fully embrace personal mobility, and, upon graduation, these same post-grads expect that their employers will do the same (this year’s Connected World Technology Report findings back this up, with more than 40 percent of recent college graduates/Gen Y employees choosing BYOD flexibility over higher pay).
Bottom line, the rules of the game are changing, and companies must move beyond basic BYOD connectivity to meet employee demands today and tomorrow. To help companies meet these demands, we’ve introduced a comprehensive approach that unifies policy, supports a better user experience and simplifies management to deliver an uncompromised user experience in any workspace. After all, Cisco wants to empower IT managers to allow employees to have their devices and use them too. That means delivering:
- A unified security policy across the whole organization – wired, wireless, VPN and now MDM – helping companies set and enforce policies;
- An uncompromised user experience over the entire wired/wireless network, across any type of device; and,
- Simplified operations and network management to understand application performance from a user’s perspective, accelerating troubleshooting and lowering operating costs.
Like Ray-Ban aviators, BYOD is here to stay. And done the right way, BYOD demands a comprehensive approach to allow current and future employees to work how they want, when and where they want, and on the devices they want – while still allowing IT the control and visibility to sleep at night.
Learn more about our announcement and new technologies here.
By the way, whether you’re a college student or have been working for 30 years, you’re eligible to take the BYOD Challenge and win a trip to 2012 London Olympics – good luck!
Tags: access point, beyond byod, bring your own device, Bring your Own Device (BYOD), byod, CIO, enterprise mobility, MDM, Mobile Device Management, mobile devices, network management, vpn, wi-fi, wifi, wireless access points, wireless LAN, wlan