Cisco Blogs


Cisco Blog > Mobility

Three Simple Ways to Boost Mobile Device Security

The explosion in business mobility is transforming our companies in profound—and sometimes challenging—ways. One of the most vexing issues is security.

Recently, I came across a Wharton article predicting that by 2015, more Americans will access the Internet through mobile devices than PCs. From open data to an increase in government-accessed information, this sweeping trend raises questions about the true security of mobile networks and devices. But how can an organization support the infusion of wireless devices into employees’ lives without opening the door to heightened security risks? Read More »

Tags: , , , , , , , , , , , ,

[Cartoon Catalyst Blog Series] K-12 BYOD. Secure Students, Determine Internet Access, and Yet Provide Awesome Network Performance?

So many students, so many devices, yet zero increase in number of IT staffers. The increasingly unbalanced ratio is enough to cause a few nightmares for any IT professional.  Luckily, supporting student IT requirements, while remaining secure, has become a bit simpler with Identity Service Engine (ISE)  Policy Deployment, part of Cisco BYOD Solutions for K12 Education.   With ISE, IT staffers can quickly add and support student’s devices like laptops, smart phones and tablets and at the same time ensure the protection of student information access, dynamically control who gets access to what and provide optimal network user experience.  You can be rest assured that we have your back while you balance it all.

K-12 TightRope1    

Protection of Minors – Let’s face it – K-12 means we’re talking about minors, so we need to tread quite carefully. Extending network access across wired and wireless opens education to a world of innovation; yet it also opens the network up to security threats. 64% of parents feel it is a schools responsibility to effectively teach students how to use their mobile devices safely [Info graphic].  Protection of access to and access by students is a high-priority.  It is critical to restrict access to confidential student records while making sure students get the right access to resources they need for learning. The ISE component of the  K12 BYOD Solution protects student information through secure,   role-based, application access – simply -- over the wired and wireless infrastructure. Read More »

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

More on Cisco’s Connected Mobile Experiences in Nice, France

Last month I wrote about the Connected Mobile Experiences deployment in Nice. One of the most interesting things I saw at the iCity launch in Nice was a real cool application that can leverage the power of Cisco’s Connected Mobile Experiences (CMX) solution to deliver very unique and exciting capabilities.

Imagine visiting a city and being able to leave your friends digital messages that only they can read when they get to a specific location. Or walking into a new area and getting localized information right then about a specific event. Or customizing signage in whatever language in native to the visitor. Imagine being able to create your own sticky note and making it public or private anytime anyplace electronically.

mandarine-translated-trimmed

All of these things are just some of the possibilities that are now made available using ‘digital graffiti’ from a small startup in the South of France called Geekgaps.

Read More »

Tags: , , , , , , , , , , , , , , , , , , ,

The Next Big Innovation Cycle for Hoteliers

Remember the time when we were trying to figure out exactly what the Internet was? Web pages and dot coms didn’t make complete sense. Wow, how times have changed. Today, our world revolves around the Internet. Most of us connect every day. And now, we are doing more than just connecting.

Our team recently joined other industry experts at HITEC 2013, the world’s largest hospitality technology show. Hot topics discussed at the show included the next generation guest, including BYOC (bring your own content), social media, Wi-Fi services, data security, mobility and more. But one topic stood out among the others – the next big innovation cycle for hoteliers.

So what is the next big innovation cycle for hoteliers?

The one thing about innovation in hotels that stands out to me right now is that it’s almost a constant two-way dialogue between the hotel and guest. When we leverage the network beyond just connecting to the Internet, the possibilities are nearly endless.  This two-way dialogue creates an opportunity to better serve customer needs. And if we pay attention to guests’ dialogue and understand their daily physical and digital habits and desires, there is no more assuming what those needs are. By constantly gathering data to determine future needs, we can create a system that not only is a solution, but can help determine solutions for the future. Read More »

Tags: , , , , , , , , , , , , , ,

Creating a Wi-Fi Monetization Virtuous Circle

In the decade or so that Wi-Fi has existed, most technologists and mobile industry executives viewed it as the “poor cousin” to licensed mobile communications.  Now mobile operators around the world are asking how they can effectively use Wi-Fi to help them cope with the huge surge in mobile data traffic and to meet customer needs and expectations.  In addition, they are all eager to understand how they can make money from Wi-Fi and to make the business case to justify investments in deploying Wi-Fi networks.

As many leading SPs are now discovering building a Wi-Fi network creates not only significant business value, but creates a virtuous circle that leads to ever-increasing sources of new Wi-Fi value. As the Wi-Fi Monetization Virtuous Circle outlined below shows, the reinforcing network and scale effects of Wi-Fi investments not only deliver unique business benefits at each of the levels, but also establish a valuable platform to exploit additional monetization opportunities at the next level.

Untitled

Read More »

Tags: , , , , , , , , , ,