Cisco Blogs

Cisco Blog > Mobility

The Fourth Step to Enterprise Mobility: Create an App Checkpoint

This is the fourth post in a blog series featuring Vine-format videos focusing on the “Six Essential Steps for Unleashing the Power of Enterprise Mobility”. The first blog post discussing how to build a mobile structure can be found here. The second blog post highlighting the benefits going virtual can be found here. The third blog post focused on preparing enterprises for the division of devices can be found here.  

For today’s app-centric mobile workforce, it’s no longer enough to provide basic security features for devices. Gone are the days where security for mobility is “all or nothing” where virtual private networks (VPNs) gave you access to all corporate network resources, or you had very limited email and calendaring access.

Today, enterprises are managing public and private mobile applications that require a shift in security practices and a new application strategy. Here’s a short checklist to guide enterprises as they create app checkpoints to meet new security demands:

Step 4

To watch the video, see:

1. Look for a rapid, reliable, and secure vetting process for applications. 

IT security teams are usually directed toward securing the network and the devices connected to it, versus securing the applications that run on those devices. Many organizations lack the resources to evaluate an application’s ability to handle sensitive information throughout its lifecycle.

Companies rarely have the resources to monitor sites that could breed malware, nor do they have the ability to maintain heuristic algorithms to identify such sites prior to infection. And those that decide to secure mobile apps themselves might end up having to prioritize remediations, leaving them vulnerable. Read More »

Tags: , , , , , , , , , , ,

Register to Learn About Cisco’s Policy Enforcement Solution

In his blog last week, Daryl Coon announced how there’s going to be a webinar this Thursday talking about Cisco’s leading One Policy solution driver, the Identity Services Engine (ISE) and its newest enhancements—now available with its 1.2 release.

During this free event, you will learn about the new features that provide increased scalability, reliability, and ease-of-use for guest access and BYOD on-boarding. You will hear from customers who have already deployed the 1.2 release. And we will discuss how the enhancements provide significantly greater capabilities than solutions available from competing vendors.Whether you need to support BYOD work practices, or provide more secure access to your data center resources, the Cisco Identity Services Engine (ISE) can help. With this all-in-one enterprise policy control platform, you can reliably enforce compliance, enhance infrastructure security, and simplify service operations.


Already sold? Join us for the free webinar, Thursday Sept 5 at 10am PST to learn more.

Tags: , , , , , , , ,

Mobile Video Collaboration

In today’s world, we are always on the go and want to communicate and collaborate wherever and however we choose to live, work, and play.

We are seeing this mobility trend emerging with more of our customers, as they realize they need their employees to be able to effectively work across their different devices while on the road or in different office locations.  And just being able to connect isn’t enough.  There must be really good quality not only in audio, but also increasingly with video and application sharing.

The latest version of Cisco TelePresence Server (v3.1) has been developed with these customer needs in mind.  Organizations can now better enable their employees to collaborate face to face while on the move, with new video capabilities that improve the user experience from any endpoint:

  • Flexibility with ActiveControl:  Users can be more engaged with a higher level of user control of meeting layouts.
  • Video quality with Cisco ClearPath:  Over highly lossy public networks – even at packet loss rates of 20% – ClearPath delivers a clear video experience.  Watch this video to see the difference ClearPath makes in quality:

Under the same network packet loss conditions, the left screen is the video experience without ClearPath; the right screen is the clear experience with ClearPath.

Are you a mobile worker, or have a mobile workforce?  We’d like to hear from you.  What do you expect and need from video for great collaboration?

Tags: , , , , , , ,

Cisco’s Policy Enforcement Solution Delivers

Whether you need to support BYOD work practices, or provide more secure access to your data center resources, the Cisco Identity Services Engine (ISE) can help. With this all-in-one enterprise policy control platform, you can reliably enforce compliance, enhance infrastructure security, and simplify service operations.

Cisco’s leading One Policy Solution—the Identity Services Engine (ISE)—now delivers even greater capabilities.

Join us next Thursday September 5 to learn about the solution’s newest enhancements—now available with its 1.2 release. The Identity Services Engine provides a comprehensive solution to manage and maintain network access and policies—ensuring consistent enforcement across wired, wireless, and VPN networks. Register today! Read More »

Tags: , , , , , , , ,

“Network as a Service” Brings the Benefits of Virtualization to Network Operators

carlos-corderoBy Carlos Cordero, Cisco Consulting Services, Service Provider

Cloud consumption models are gaining traction across all company sizes and industries.  Whether software as a service (SaaS), infrastructure as a service (IaaS), or platform as a service (PaaS), the value propositions of virtualization are being sought by IT decision makers.

Cisco Consulting Services sees an opportunity for network service providers (SPs) to deliver a similar experience through a new solution architecture that we call network as a service (NaaS). NaaS does for the network what SaaS and IaaS have done for the data center —  offering many of the same value proposition components, such as lower OpEx and increased agility, as well as new business model levers and distribution benefits.

A Simple NaaS Architecture Delivers Broad Benefits

To illustrate the value, this paper focuses on NaaS for mobile operators, although similar value could be articulated across all SP segments. Today, the various engineering and operational functions required to enable new customers, new services, and repairs are buried behind monolithic and independent network elements. The goal of NaaS is to simplify the architecture through virtualization, bringing disparate software solutions onto common hardware.

At the heart of mobile NaaS is an intelligent core with the service elements needed to deploy mobile data services (Figure 1). Traditionally, each software element runs on dedicated hardware, but under NaaS, these elements are separated so the software can run on shared virtual machines. The model also includes a common storage and compute infrastructure that can be delivered to the intelligent core as needed through a virtual machine approach. The intelligent core should work across a variety of licensed and unlicensed access technologies, shown at right. The active service catalog represents the SP’s ability to create unique service environments by combining service elements in an automated and simplified way. Finally, the secure portal enables consumers and business customers to access and manage their own network instances.

Figure 1.                  Mobile NaaS Is Anchored in a Flexible and Extensible Set of Service Elements. Read More »

Tags: , , , , , , , ,