Cisco Blogs


Cisco Blog > SP360: Service Provider

Wi-Fi Value-Added Services Improve the Retail Bottom-line

Retailing has always been a tough business.  But, the move to online shopping, the challenging economy and changes in shopper’s behavior has placed even more pressure on traditional retail margins.  Retailers are constantly looking for ways to get more people in to their store and to spend more.  Traditional retailers have long envied the massive amounts of valuable data that online retailers have available to help them better understand customer behavior and implement winning marketing tactics.  Online retailers know such valuable information as: how frequently customers return, how long they spend on the site, what they looked at but didn’t buy and where they went before and after coming to the site.  With this information, online retailers are able to rapidly adjust prices, promote certain items, and re-configure the layout of the site in almost real-time in order to increase the probability and value of a sale.  None of these data and insights has been available to bricks-and-mortar retailers -- until now.  The increasing availability of Wi-Fi in retail locations is changing all of that.

Shopping malls and retailers are increasingly offering Wi-Fi to their customers as a service to connect their mobile devices to the Internet.  Hidden in this Read More »

Tags: , , , , , , , , , , ,

Higher Education Races Towards 802.11ac

[Webinar] 802.11ac in Higher Education | Wednesday July 24 at 3pm PST < REGISTER

It’s no secret that mobile devices are playing a larger part in today’s businesses. With the fast pace of mobility adoption by consumers, network usage has started to outrun the infrastructure of most enterprises’ mobile networks. Enterprise IT managers are struggling to keep up with mobility’s effects on workplace productivity and requirements.

Among the growing trends that weigh heavily on the minds of most network IT professionals is bring your own device (BYOD). The growth of bandwidth-intensive applications, like video streaming, and the user expectations of always-on network and application performance also place heavy demand on organizational infrastructure.

802.11ac is the next generation of Wi-Fi, designed to give enterprises the tools to meet the demands of BYOD, high-bandwidth applications, and the always-on connected user. This Wednesday we will be hosting a workshop to discuss the benefits of 802.11ac, and how to optimize it for high density and high bandwidth to benefit higher education. Students, typically early adopters of wireless technology, usually bring 802.11ac in the form of the latest laptop, smartphone, and tablet that support this new technology. Read More »

Tags: , , , , , , , , , , , , , , , , , ,

[Cartoon Catalyst Blog Series] K-12 BYOD. Secure Students, Determine Internet Access, and Yet Provide Awesome Network Performance?

Students bounding into schools touting the latest device is creating big problem for K-12 IT departments. How can schools support BYOD initiatives while securing these mobile devices and the student information embedded within them if IT staff numbers aren’t growing?

In his latest blog, K-12 BYOD. Secure Students, Determine Internet Access, and Yet Provide Awesome Network Performance?, Cisco’s Rahul Chohan discusses how Identity Services Engine policy deployment as a part of Cisco BYOD Solutions for K12 Education helps simplify mobile device security streamlines the IT security processes required to deploy BYOD. Rahul’s blog covers how ISE helps protect minors, ensure performance, and simplify IT over the wired and wireless infrastructure. How exactly can it do this? You’ll have to read his blog to find out.

For more on Cisco BYOD Solutions for K12 Education page.

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

Three Simple Ways to Boost Mobile Device Security

The explosion in business mobility is transforming our companies in profound—and sometimes challenging—ways. One of the most vexing issues is security.

Recently, I came across a Wharton article predicting that by 2015, more Americans will access the Internet through mobile devices than PCs. From open data to an increase in government-accessed information, this sweeping trend raises questions about the true security of mobile networks and devices. But how can an organization support the infusion of wireless devices into employees’ lives without opening the door to heightened security risks? Read More »

Tags: , , , , , , , , , , , ,

[Cartoon Catalyst Blog Series] K-12 BYOD. Secure Students, Determine Internet Access, and Yet Provide Awesome Network Performance?

So many students, so many devices, yet zero increase in number of IT staffers. The increasingly unbalanced ratio is enough to cause a few nightmares for any IT professional.  Luckily, supporting student IT requirements, while remaining secure, has become a bit simpler with Identity Service Engine (ISE)  Policy Deployment, part of Cisco BYOD Solutions for K12 Education.   With ISE, IT staffers can quickly add and support student’s devices like laptops, smart phones and tablets and at the same time ensure the protection of student information access, dynamically control who gets access to what and provide optimal network user experience.  You can be rest assured that we have your back while you balance it all.

K-12 TightRope1    

Protection of Minors – Let’s face it – K-12 means we’re talking about minors, so we need to tread quite carefully. Extending network access across wired and wireless opens education to a world of innovation; yet it also opens the network up to security threats. 64% of parents feel it is a schools responsibility to effectively teach students how to use their mobile devices safely [Info graphic].  Protection of access to and access by students is a high-priority.  It is critical to restrict access to confidential student records while making sure students get the right access to resources they need for learning. The ISE component of the  K12 BYOD Solution protects student information through secure,   role-based, application access – simply -- over the wired and wireless infrastructure. Read More »

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,