As a business or technical leader, you know you need to protect your company in a rapidly evolving mobile ecosystem. However, threats are not always obvious. As malware and attacks become more sophisticated over time, business decision makers must work with technical decision makers to navigate security threats in a mobile world.
This blog series, authored by Kathy Trahan, explores the topic of enterprise mobility security from a situational level and provides insight into what leaders can do now to mitigate risk. To read the first post focused on securing device freedom, click here. The second post, available here, focused on the risks that come with mobile connections. Kathy’s third post explored how to secure mobile data. – Bret Hartman, Chief Technology Officer (CTO) for Cisco’s Security Technology Group
In today’s mobile and cloud-centric landscape, the ability for employees to access data, account information, real-time statistics, and other pertinent information on their personal devices is what it takes to remain competitive in the business marketplace.
And while the rush has been on to empower employees to be able to connect from anywhere, security concerns are topping the “must address” list of enterprises everywhere.
One key concern is the increasing use of mobile devices to access relevant business information. In fact, according to the Cisco Connected World International Mobile Security survey, 63% of users downloaded sensitive data on such devices.
So, in a scenario where a team of sales representatives are updating account profiles by accessing data on their personal devices, IT and business leaders must ask: How secure is the network the team is using to access sensitive company information? Is it possible malware on their mobile devices can gain entry from a public or private cloud to compromise or steal data? Should mobile security policies prohibit certain employees from downloading certain information when they are off-site?
These questions must be answered. Especially since over the next four years, there will be nearly 21 billion networked devices and connections globally. Business Decision Makers (BDMs) and Technical Decision Makers (TDMs), must team up and determine the best mobile security policies that balance productivity and security of sensitive data, notably understanding security threats and establishing access requirements.
Read More »
Tags: Cisco, Cisco Mobility, future of mobility, mobile, mobile device, mobile security, mobile workspace, mobility, network, security
Did you catch the news from Cisco and Citrix yesterday? Here at Citrix Synergy, we announced the new Cisco Mobile Workspace Solution with Citrix. This new jointly integrated solution brings together best of breed technologies from both companies to deliver a pervasively accessible end user workspace – One that can be delivered on any device, anywhere, seamlessly and securely integrated with the applications and productivity suite necessary for workers to be productive.
Central to this solution are the following tenets of the new mobile workspace:
- Supporting any device, any OS
- Maintaining secure access to the corporate network
- Facilitating rapid expansion and control of mobile applications
- Protecting data and preventing data loss
Foundational to the New Mobile Workspace is a best-in-class workspace virtualization platform built on Cisco Unified Computing System and Citrix XenDesktop.
Check out this infographic which Cisco and Citrix have compiled highlighting some nice proof points of business impact enabled by Cisco Desktop Virtualization Solutions with Citrix XenDesktop – then, ask yourself – “Can Your Server Deliver Results Like These?”
While here at Synergy, I’ve had numerous conversations with VDI implementers who’ve resonated with the unique benefits and performance advantage associated with deploying hosted VDI as well as hosted shared desktops on UCS. Surprised in fact, at the number of attendees I run into who are already well familiarized with:
- The performance advantage VMFEX brings to XenApp environments
- The simplified manageability of UCS Service Profile Templates, enabling rapid turn-up of XenDesktop environments starting from bare metal servers
- The linearly consistent performance with scale, proven through Cisco Validated Designs for Citrix XenDesktop
The roster of clientele that have tapped the benefits of XenDesktop deployed on UCS continues to grow, providing these organizations an accelerated path to delivering an enterprise-wide mobility strategy, built on this differentiated virtual workspace infrastructure.
Tags: Cisco, citrix, desktop virtualization, mobile workspace, mobility, vdi
Having an enterprise-wide mobility strategy provides a competitive advantage as a recent IT survey from Cisco concluded. Working with many customers over the last couple of years we have come to recognize that mobility is a multi-stage journey that every organization is taking at its own pace. While some of you might think of this journey as just getting your employees’ devices onto your network, there is significantly more to the journey – device-focused leads to application-focused, which then leads to experiences-focused.
Being a dad to my 5-month old son, I can relate our customers’ mobility journey to the 3 stages a child goes through in his first year as they learn to be mobile – roll, crawl, and walk!
Babies start off without the ability to move from one spot to the next– think of this as your enterprise 10 years ago before the popularization of smartphones. Then babies learn to roll. Suddenly, the world opens up to them. This is the first stage of the mobility journey – similar to a device focused BYOD strategy. The focus here is to provide a secure onboarding experience for your users while having the right policies in place to enable context-aware secure access control. The Cisco Unified Access solution – with ISE for policy, Prime Infrastructure for management, and converged wired and wireless network – provides the foundation for enable this BYOD solution. However, would you really want to stop at the rolling stage of development?
The next step for kids is learning to crawl. This is often the most exciting stage as kids can now move with intent. Crawling provides true mobility to the kid as he can explore the fascinating world around him and get access to all his toys. This is the application-focused strategy in your mobility journey. Now that you have enabled secure access for your workforce, you can decide on the right set of applications to enable your workforce to be productive – on the go. This is where Cisco has been working with our ecosystem partners to provide a complete mobile workspace solution.
One of these ecosystem partners is Citrix and in this blog, I’d like to highlight a first-of-its-kind solution for employee mobility, that Cisco & Citrix have developed in close collaboration.
This new Cisco Mobile Workspace Solution with Citrix, built on the Citrix Workspace Suite, provides the complete hardware and software technology stack for delivering all the applications, content, and tools workers need on any device. This new Workspace Solution is excellent for companies moving into the second stage of their mobility journey – where their focus is on providing all the applications, content and services their employees need on their devices.
This solution can help your employees, partners, and consultants work and collaborate on their mobile and desk devices, from pretty much anywhere. Read More »
Tags: byod, citrix, ISE, mobile workspace
The times keep changing: first there were devices, then there were apps, and today, if you don’t develop a strategy for enterprise mobility and get ahead of the trend, the mobile wave will leave you behind. A year ago, after talking with many of our customers, partners, and our own technical sales teams, we realized that IT organizations were facing enormous challenges when making the transition from simple BYOD to adopting an enterprise mobility strategy across the business. As is typical during such tremendous market transitions like mobility, IT organizations were spending a lot of time figuring out how to line up the pieces required to support a mobile workforce, sorting through and weighing the many technology and vendor choices.
Today in conjunction with our friends at Citrix, we are happy to highlight the Cisco Mobile Workspace Solution with Citrix, built on the Citrix Workspace Suite. We are very excited to deliver this first of its kind, comprehensive solution to our customers. Today I’d like to take a step back and set the stage for the Cisco Mobile Workspace Solution with Citrix by taking you through our thought process in creating the right enterprise mobility solution for our customers. Read More »
Tags: ACI, App, byod, Cisco Validated Design, citrix, Citrix Workspace Suite, Complexity, customer, device, Enterprise, experience, mobile, mobile workspace, mobility, sales, secure, security, technology, trend, wifi, wireless
Security plays an important role in the success of mobility implementations worldwide. We assume security threats are always present, however it’s not always apparent where threats may arise from. Being aware of these potential risk areas is crucial.
Business decision-makers must gain insight into where these breaches are occurring. They should also understand why it is important for them to care, and how they can be aided by technical decision-makers to solve these issues moving forward.
Here’s a brief look into the where, the why and the how of embracing a secure approach to enterprise mobility and what it means for business leaders.
Where are security threats? Today’s organizations are facing a greater attack surface as advanced mobile devices and public cloud services foster new attack models and increasing complexity within networks. To cover the entire attack continuum, organizations need to address a broad range of attack vectors with solutions that operate everywhere the threat can manifest itself: on the network, on traditional endpoints, on mobile devices, and in virtual environments.
How can threats be thwarted? The best approach is a proactive one, rather than a reactive one, especially when many organizations may not know when they are under attack. Business leaders must work with IT teams to institute a formal program for managing mobile devices and to ensure that any device is secure before it can access the network.
Why does a balanced approach to mobile security matter? In a recent blog post, I discussed the need for organizations to deploy a balanced approach to mobile security. This approach should focus more on protecting the network and proprietary data and less on implementing overly broad restrictions. IT needs to approach security with a user experience mentality. After all, if you overly manage devices, your adoption will be low and so will your return on investment (ROI). This approach can lead to greater opportunities to align threat intelligence and security best practices.
To learn more about this balanced approach to mobile security, read the full blog: Navigating Security Threats in a Mobile World.
Tags: architecture, Cisco, future of mobility, infrastructure, mobile, mobile device, mobile security, mobile workspace, mobility, network, security, wi-fi, wifi, wireless