mobile security

April 24, 2014

SECURITY

Mobile Security: Actions Speak Louder than Words

3 min read

Mobile security is a top concern for IT and business leaders. This guest authored blog series with Dimension Data explores how organizational leaders can work together to mitigate concern and implement clearly defined policies to achieve mobility goals. We are pleased to introduce our guest author Darryl Wilson, Director, Enterprise Mobility for Dimension Data Americas, as the […]

March 18, 2014

NETWORKING

Summary: Navigating Security Threats in a Mobile World

1 min read

Security plays an important role in the success of mobility implementations worldwide. We assume security threats are always present, however it’s not always apparent where threats may arise from....

March 14, 2014

SECURITY

Navigating Security Threats in a Mobile World

3 min read

Security plays an important role in the success of mobility implementations worldwide. We assume security threats are always present; however, it’s not always apparent where threats may arise from....

February 12, 2014

SECURITY

Summary: Tackling Mobile Security Risks for Government

1 min read

As mobility becomes more pervasive, these concepts of cyber crime have become engrained in our work/life culture. These issues have earned national news headlines as governments across the globe...

February 11, 2014

EXECUTIVE PLATFORM

Tackling Mobile Security Risks for Government

3 min read

"Cyber threats. Security breaches. Hacking." As mobility becomes more pervasive, these words have become engrained in our work/life culture. The issue of cyber crime has earned national news headlines...

January 31, 2014

DATA CENTER

Securing Cloud Transformation through Cisco Domain Ten Framework v2.0

3 min read

Businesses of all sizes are looking for Cloud solutions to solve some of their biggest business and technology challenges—reducing costs, creating new levels of efficiency, transform to create agile environment and facilitate innovative business models. Along with the promise of Cloud comes top concern for Security. With rise of applications, transactions and data in the Cloud, […]

January 17, 2014

SECURITY

Securing the Future Enterprise

3 min read

This blog post is part three of a three-part series discussing how organizations can address mobile security concerns through an architectural approach to mobility. The first post discusses how next-gen...

November 13, 2013

SECURITY

Cybersecurity: Where are the Biggest Threats?

1 min read

Rarely a week goes by that we don’t hear of a database compromise that results in confidential data—many times consisting of personally identifiable information (PII)—falling into the hands of those who should not have access to the data. Protection of our PII is becoming increasingly critical as more and more information is collected and stored through the use of Internet-enabled devices.

September 3, 2013

NETWORKING

Register to Learn About Cisco’s Policy Enforcement Solution

1 min read

In his blog last week, Daryl Coon announced how there’s going to be a webinar this Thursday talking about Cisco’s leading One Policy solution driver, the Identity Services Engine (ISE) and its newest enhancements—now available with its 1.2 release. During this free event, you will learn about the new features that provide increased scalability, reliability, and ease-of-use for guest […]