With the growing influx of new mobile devices, connected things, bandwidth intensive applications and more data, the network is more relevant to business success than ever before. Back in June of 2012, Cisco saw that we needed to move away from multiple network systems loosely linked together to an agile and simple infrastructure, streamlined policy and centralized management would be needed to support new business demands. We called it Cisco Unified Access and we aligned the solution to three pillars: One Network, One Policy and One Management.
For the last few years, we have focused on delivering new products and functionality under this Unified Access model. Below is a timeline of products released as part of the Unified Access framework. Cisco lead the way in delivering gigabit 802.11ac Wi-Fi., converged wireless control in access switches and through the acquisition of Meraki – a complete cloud-managed network solution.
The timeline above doesn’t represent every feature and function we have delivered, but it shows Cisco’s commitment to this Unified Access model, both from a cloud-managed and on-premise solution perspective.
Today, Cisco is announcing a number of new products and new functionality to existing products that will help mobilize the workforce, secure the business and increase IT agility. The announcement includes the following: Read More »
Tags: #80211ac, 11ac, 802.11ac, access, access point, Agile, agility, Aironet, anyconnect, AP, App, application, asr, bandwidth, business, byod, Cisco, compliance, converge, converged, Converged Access, data, device, emm, employee, Enterprise, experience, feature, foundation, function, gigabit, Guest, guest access, HD, HDX, high density, identity, indoor, infrastructure, interop, ISE, ISR, IT, LAN, lifecycle, Manage, management, MDM, meraki, mobile, mobility, model, network, operation, outdoor, policy, portfolio, prime, Prime Infrastructure, product, secure, security, services, simple, simplify, system, System Manager, technology, traffic, unified access, vpn, WAN, wi-fi, wifi, wired, wireless, wlan, workforce
The industry is going beyond BYOD—it’s not just about simply connecting the device anymore: the mobile landscape has grown to include apps, devices and content, all of which require security and management. This is no easy task. Enterprise mobility management (EMM) is no longer a nice-to-have for our customers—it is a necessity. You need a mobile strategy.
We at Cisco have been steadily building out our mobility portfolio across infrastructure, policy and management over the past few years to provide our customers with what they need to get ahead of the mobile trend.
It has always been Cisco’s strategy to use open API’s with ISE to integrate with host of 3rd party EMM vendors, including Citrix, MobileIron, Airwatch and many more. We are now extending that flexibility to create a cloud-managed EMM offering with our Cisco Meraki solution. The latest addition to the Cisco mobility portfolio, the Cisco Meraki Systems Manager Enterprise is an evolution of Cisco Meraki’s existing MDM cloud offer, and a natural extension of the Cisco Meraki network management solution (e.g. extending management of wireless access points to the management of devices connecting to the enterprise domain).
Cisco is committed to customer choice, and will continue to offer different options to the market, including ecosystem EMM partner solutions. The addition of the Cisco Meraki Systems Manager broadens that portfolio to strengthen our offering and empower our customers attain the mobility solution best suited for their specific requirements.
For more information on the Cisco Meraki Systems Manager, read the full announcement blog here.
Tags: 3rd party, access point, AirWatch, API, App, application, byod, citrix, connect, content, customer, device, emm, Enterprise, Identity Services Engine, infrastructure, ISE, Manage, management, market, MDM, meraki, mobile, mobile device, MobileIron, mobility, network, partner, policy, portfolio, secure, security, solution, system, systems manager, trend, vendor, wi-fi, wifi, wireless
A couple weeks ago, we spoke about the mobility journey and the phases that organizations take as they embrace the widely accepted mode of mobility—Beyond BYOD to Workspace Mobility (device-focus, application-focus and experience-focus). Whatever phase your organization is in, security is a top priority. These phases can help determine your secure mobility approach but your risk aversion level will also define it. Whatever your risk tolerance, the mobile threat landscape is extremely active and clever—do not underestimate it.
The dynamic nature of mobile threats does not stop by simply entering from your mobile device but it can further propagate and manifest across the network, wired devices, virtual, cloud and data center environments. So your secure mobility approach must be non-stop, continuous and pervasive—end to end. To hinder the chance of threat damage or inappropriate access whether intentional or not, one must offer comprehensive secure mobile access controls at the access layer across each phase of an attack, before, during and after.
Read More »
Tags: ATP, Black Hat, data protection, enforcement, MDM, secure mobility, SIEM, threats
One of the interesting and challenging aspects of working in the Mobility space is the sheer pace at which the industry is moving. I’m fortunate to work with many Customers in EMEA to help support and shape their strategy towards Mobile technology. A great example of this has been the reaction to BYOD.
The influx of personal devices into the Enterprise caused by the BYOD trend poses numerous challenges to IT Departments. Understandably, initial reaction was to focus on network and device level Security.
Cisco responded by introducing a BYOD Solution to remove some of the burden from IT Departments and provide them with a central point for managing many aspects of the BYOD lifecycle: onboarding, device profiling, authentication, authorization, offboarding and self-service management.
Almost at the same time, a new industry segment was created: Mobile Device Management. The intent of MDM systems is Read More »
Tags: authentication, authorization, business, byod, device, Enterprise, IT department, MDM, mobile device, Mobile Device Management, network, offboarding, onboarding, profiling, security, self-service management, trend
My company is in the very early stages of an MDM BYOD project. As part of that we are looking at the Cisco Identity Service Engine (ISE) as a central piece. I am about half way through my testing and I thought that I would pass on some of what I have learned so far. I am far from being an ISE expert and I don’t mention profiling or the advanced features in this post. I have tried them but don’t feel knowledgeable enough to go into these details.
ISE is an excellent NAC system but it does much more than that. One of the advantages of trying to configure a new piece of technology yourself is that you learn much more and also other ways to increase the ROI. The main reason we are interested in ISE is as the enforcement point on our wireless network. When a device tries to connect to our BYOD network we want ISE to query the MDM server to verify if the device is registered and if not to redirect the device to the MDM provisioning portal. If the device is registered with MDM ISE will then query AD and verify the user credentials. This is a core function of ISE and went fairly well. Read More »
Tags: #ciscochampion, byod, Cisco Identity Service Engine (ISE), MDM, NAC