Cisco Blogs


Cisco Blog > Mobility

MSE Blog Series Part 4: wIPS

To continue the MSE Blog Series, I’m going to take you on a journey to dig deep into one of the features of Release 7.4, wIPS!

With the increasing popularity of BYOD, wireless security has become an eminent concern for Network Administrators. Cisco Unified Wireless Intrusion Prevention Solution (WIPS) is dedicated to protecting the wireless network security and provide a secure wireless experience to the clients. Cisco, allied with Flukes Networks, to constantly monitor new wireless intrusion techniques, develop new signatures and provide preventive solutions. In 7.4 release, we added the capability of detecting 802.11 frame fuzzing attacks. The new signatures patterns, for detecting such attacks, are available through WIPS profile configuration in NCS. These signature patterns are enabled by default and provide the full level of security. The user, however, could tune them to get the desired protection level.

wips 1

Read More »

Tags: , , , , , , , , , , , , , , , , , ,

Have you registered for Part 1 of “Activate the IT Transformation with Unified Access” Webinar Series?

This Wednesday, we’re kicking off a great webinar series that will walk you through the Cisco Unified Access solution. With the five-part series, we’re breaking down the one policy, one management, one network story into technical, informative chunks. Part 1 is in just two days, so if you haven’t registered, CLICK TO REGISTER

Read More »

Tags: , , , , , , , , , , , , , , , ,

5 Steps To Becoming a Social Media Master!

People are becoming more media savvy than ever before. The advent of social media has resulting in people consuming and sharing more information. A by-product of this is that people have becoming adept at ignoring traditional marketing and advertising and better at spotting marketing content trying to masquerade as something else. The best way to overcome the challenges presented by this new social world is to embrace this awareness and willingness to interact and use it to your advantage.

Marketing in a social word means you need to change when, where, and how you speak to consumers. Instead of sending them a static message (like a traditional ad) you need to interact with them. Here’s a few key things to keep in mind:

Read More »

Tags: , , , , , ,

Activate the IT Transformation with Cisco Unified Access: Part 1

With the ever growing demands placed on IT organizations to “do more with less” it is becoming apparent that the way we deploy the network infrastructure, how we administer policies and how we manage the whole thing needs to evolve.

Why is IT spending so much time maintaining separate wired, wireless and VPN networks? We need to focus on the business that is banging on the door telling you to support more mobile and wired devices, more bandwidth hungry applications and extend that support well beyond the walls of corporate facilities.

How can we simplify how IT operates and still deliver a high-performance, high-quality connected experience? Cisco Unified Access can help! We announced the webinar series earlier this week, and part 1 is just around the corner.

In next Wednesday’s webinar (CLICK TO REGISTER) we will discuss:

  • The industry perspective regarding challenges surrounding, BYOD, Mobility and the Internet of Everything
  • The latest Cisco technology that can help you simplify and optimize you network
  • How a unified access network can improve performance and operations
  • Deploying consistent and contextual policies will improve access control and enforcement
  •  How reducing operational complexity can accelerate device deployment and end user problem resolution.

Read More »

Tags: , , , , , , , , , , , , , , , ,

Network Threats Are Hitching a Ride in Mobile Environments

Innovation never stops in the mobile world, and that rule applies to security threats as well. Network attacks are becoming more sophisticated and even high-tech businesses with the most advanced security may find themselves in the crosshairs as we shift to more devices and anywhere access.

Just a few weeks ago, multiple leading social networking and large enterprises were hit with an attack when their employees visited a known and trusted website focused on mobile application development. Attackers used a method commonly referred to as “water-holing,” where they compromise a legitimate site commonly visited by employees of their target organizations. Using zero-day vulnerabilities and malicious code that change at a rapid rate, these attacks highlight the need to consistently enhance traditional defenses based on signatures or reputation with global and local context analysis.

This episode underscores how important security is in a more mobile, more connected world—attackers are paying attention, using these industry trends to create targeted and sophisticated attacks that can bypass traditional defenses. The Cisco 2013 Annual Security Report found that Android Malware grew 2,577 percent in 2012 alone. The Internet of Everything is taking shape and the number of online connections is soaring. According to Gartner’s Top 10 Strategic Technology Trends for 2013, 30 billion things will be connected by 2020.

Read More »

Tags: , , , , , , , , , , , , ,