Cisco Blogs


Cisco Blog > Digital and Social

3 Easy Tools to Protect Your Data BEFORE Your Device Gets Lost or Stolen

I was the recently on the wrong end of a 488. For those of you who aren’t familiar with the California penal codes, that’s a petty theft. My laptop, PS3, and iPad are gone, taken from me. At this point, I can only hope that my things broke in the act of the robbery and are rendered useless.

Unfortunately, hope and $3.50 will get me a café latte and that latte cannot secure my precious data at this point; my saved passwords, tax returns…the keys to the castle. Our devices are increasingly holding more important information and when these devices get compromised, so does our sensitive data.

Read More »

Tags: , , , ,

Live Interop Session: Customer Case Study, Take Control of Mobile Devices on Your Network

Tablets and mobile devices are driving massive change in the IT world. We are seeing a few key shifts that need to be addressed:

The user to device ratio has changed, while IT resources stay the same:

  • Early 1990s: Each user has one device on a wired connection.
  • Late 1990s: Users have gone mobile with laptops and other local devices.
  • Today: Employees require anytime, anywhere access with multiple devices per person.

IT is struggling to secure, manage and support employee-owned devices in the workplace, bringing it’s own set of challenges:

  • Classifying managed vs. unmanaged endpoints.
  • Ensuring proper identification and authentication of devices.
  • Associate each user with the proper host.

It all comes down to this: when your employee brings an iPad into work, how can you centralize access and policy management, without adding IT resources?

Join our session to learn how the Cisco Identity Services Engine and Cisco Prime Network Control System offer the solution. Timothy Abbott, Senior Network Engineer, CCNA, CCNP will be on-site to present a case study from his experience at the San Antonio Water System.

We hope to see you Wednesday May 11th, 11:15am – 12:00pm in the Mandalay Bay L conference room. Learn more.

Tags: , , , , , , , ,

iPads on Your Network? Take Control with Unified Policy and Management

Users are increasingly carrying their iPads, iPhones and Android smartphones into the workplace. These mobile devices and tablets introduce new security threats and IT management challenges.

Join us for the third in our series of webinars to learn about new Cisco innovations that will help you identify the devices, apply policies and enable user management across wired and wireless networks. Featuring special guest speaker Dan Larkin, Director of Strategic Operations for the National Cyber-Forensics and Training Alliance (NCFTA) who will share the new threat vectors introduced due the influx of mobile devices. Take control of your network now.

Live webcast Wednesday, May 4th from 10:00 – 11am PDT (12:00 – 1:00pm EDT)
Register now!

Tags: , , , , , , , , , , ,