Cisco Blogs


Cisco Blog > Collaboration

Summary: A Balanced Approach to Mobile Security

For the benefits of collaboration to be better realized, IT leaders must take a balanced and strategic approach to mobile security that focuses more on protecting the network and proprietary data and less on implementing overly broad restrictions.

Gartner recently made three interesting predictions about mobility in the workplace. And while each of these predictions are compelling – they only offer one-side of the story and the solution:

  1. Twenty percent of BYOD projects will fail by 2016 due to IT’s “heavy hand.”
  2. Strict mobility policies will drive employees to want to isolate personal data from business data.
  3. Mobile browsers will gain market share for app delivery for multiple platforms, and the role of HTML5 in solving issues that arise with the multiple platform problem.

Instead, IT leaders should encourage employees to use secure solutions on devices connected to the network. Managing belief and behaviors of users and deploying a flexible infrastructure that can support an open BYOD policy and mitigate advanced security threats, can have tremendous impact on creating an immersive collaborative environment.

Learn more about how Gartner’s mobility and security predictions can affect the future of collaboration by reading the full blog: A Balanced Approach to Mobile Security.

Tags: , , , , , , ,

A Balanced Approach to Mobile Security

Gartner recently made three interesting predictions about mobility in the workplace. While the ideas are compelling, they only offer one-side of the story, and the solution.

In this blog post, I’ll take a deeper look at each of these predictions and discuss why the future of mobility rests on IT leaders taking a balanced and strategic approach to security that focuses more on protecting the network and proprietary data and less on implementing overly broad restrictions.

Gartner Prediction #1: Twenty percent of BYOD projects will fail by 2016 due to IT’s “heavy hand.”

While the actual failure rate may be less than one-fifth, mobility efforts will fail if companies are too restrictive with MDM policies. Instead, a two-fold approach to supporting a BYOD environment from a security perspective is essential.

First, IT leaders should take a balanced approach to security that protects business-imperative network solutions and data. In most cases, blocking Angry Birds and Candy Crush is unnecessary and not scalable. With Apple and Google supporting over a million apps each (and counting), it can cost precious time and IT resources just trying to keep up with restricting non-threatening applications.

Secondly, IT leaders should be focused on encouraging users to use secure solutions. This will only grow more important as the explosion of new connections and various devices evident in today’s Internet of Everything world creates more opportunity for malicious actors to utilize even more inroads to compromise users, networks, and data. By educating employees to take an active role in the security of their device, users can be empowered to report suspicious threats and have an open dialogue with IT teams. Read More »

Tags: , , , , , , , , , , , ,

Cisco CMX @ NRF 2014

NRF1

NRF 2014 was held last week at the Javits Centre in New York City. It’s the biggest retail event of the year where vendors show off the future of the industry to all the delegates both using inspiring key notes and exciting demos on the Expo floors.

2014 and beyond:

It wasn’t too hard to identify that there were some common themes. On Tuesday afternoon I stood on the main Expo floor and just looking around I could quickly see the industry’s top of mind phrases and buzz words popping out:

“Omni channel”,”Onmianalytics”, “Predictive”, “Insights”, “Customer science and Analytics”, “Precise Location Matters”, “Analyze Decide”, “Mobilize”, “Mobility solutions”, “Big data”, “Customer engagement”, “Adaptive offers”, “Personalized customer experience”, “Customer Experience Analytics”

We certainly are entering the era where using data, analytics and personalization is no longer just an interesting notion or “nice to have” for retail -- it is now the KEY thing companies MUST do.

And a big common theme is that mobile is exploding and changing things rapidly, so retailers either need to keep up or inevitably fall behind their competitors. Read More »

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , ,

HDX Blog Series #3: 802.11ac Beamforming At Its Best: ClientLink 3.0

Editor’s Note: This is the second of a four-part deep dive series into High Density Experience (HDX), Cisco’s latest solution suite designed for high density environments and next-generation wireless technologies. For more on Cisco HDX, visit www.cisco.com/go/80211ac.  Read part 1 here. Read part 2 here.

The 802.11ac wireless networking standard is the most recent introduction by the IEEE (now ratified), and is rapidly becoming more accepted and reliable industry standard. The good news is that the client and vendor adoption rate for 802.11ac is growing at a much higher pace as compared to when 802.11n was introduced back in 2009. There has been an accelerated growth seen with the mobile and laptop devices entering the wireless market embedded with an 802.11ac WiFi chipset. Unlike in the past, laptop, smartphone and tablet manufacturers are now acknowledging the fact that staying up to date with the latest Wi-Fi standards is as important for the bandwidth hungry users as having a better camera or a higher resolution display.

With the launch of the new 802.11ac AP 3700, Cisco introduces the Cisco HDX (High Density Experience) Technology. Cisco HDX is a suite of solutions aimed towards augmenting the higher performance, more speed and better client connectivity that 802.11ac standard delivers today.

ClientLink 3.0 features as an integral part of Cisco HDX technology designed to resolve the complexities that comes along with the new BYOD trend driving the high proliferation of 802.11ac capable devices.

So what is ClientLink 3.0 technology and how does it work?

ClientLink 3.0 is a Cisco patented 802.11ac/n/a/g beamforming technology Read More »

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

Discover What Consumers Want from Wi-Fi and Mobile

Consumers have a true love of mobile devices, as evidenced by recent Cisco mobile consumer research.  Significant percentages of respondents reported using everything from laptops, smartphones, and tablets to eReaders and mobile gaming devices. Americans now own an average of three mobile devices each, up from 2.6 devices in the 2012 Cisco mobile consumer study.  Perhaps more significant, our findings show that the number of smartphone users has grown by 21 percent in just one year, now reaching 68 percent of the population, at the expense of basic phones. Most remarkable is that the number of tablet owners has expanded by over 90 percent in just one year, with close to four out of ten consumers possessing one of these new devices.

The insatiable demand for mobile devices and new applications that use large amounts of bandwidth is generating staggering volumes of mobile data. In parallel, the use of Wi-Fi for Internet access is exploding, as more mobile devices are Wi-Fi enabled, the number of public hotspots expands, and user acceptance grows. Most mobile operators now realize that offloading data traffic to Wi-Fi can, and must, play a significant role in helping them avoid clogged networks and unhappy customers. Many service providers are now constructing extensive networks of public Wi-Fi hotspots for use by their mobile or home broadband customers. The networks allow mobile offload and help enhance and differentiate their offerings. In addition, service providers are struggling to understand new business models for making money from Wi-Fi.  However, very little is currently known about how consumers are actually using public Wi-Fi and how they view the overall experience. Nor is there much information about mobile users’ appetite for these new services, their willingness to use them, or their privacy or security concerns surrounding these data-based services.

To learn more, Cisco conducted a survey of 620 U.S. mobile users to understand their needs and behaviors, use of devices, applications and mobile access technologies, and how they have changed since our 2012 mobile consumer study.

Top 10 Research Findings Read More »

Tags: , , , , , , , , , , , ,