Cisco Blogs

Cisco Blog > Security

Deliver Stronger Secure Mobility with Cisco and Samsung

The growing use of mobility is a new threat vector in the extended network. It’s particularly complex to secure and manage when tablets and smartphones are used for both personal and business needs. The Ponemon 2014 Security Impact of Mobile Device Use by Employees study notes that 66 percent of users download mobile apps without their company’s permission. This downloading behavior increases the attack surface by introducing unapproved or personal mobile applications.

As highlighted in the Cisco Annual Security Report for 2015, mobile applications are a new threat vector that could include malware. The potential for this user-appropriated malware to access corporate resources introduces a lot of new risks that need to be addressed by IT security personnel. At Cisco, we’ve just completed a new integration with Samsung to enable workers to be productive while locking down this expanded attack surface.

Read More »

Tags: , , , , ,

Using a Robot to Get Marketing Insights for Your Venue?

NRF 2015 is a wrap. The annual show where anyone who’s anyone in retail goes to learn about the latest ways to grow revenues and improve store operations. Here’s something you may have missed:


Meet Collecto. Your one stop shop for all marketing Read More »

Tags: , , , ,

Three Dimensions that Influence Location Quality

Since the earliest maps, location accuracy has always been important. Just one degree off on the high seas and the seafaring navigator could be landing in Cuba instead of Florida. As we progress from GPS to indoor location, the quality of location accuracy is no less critical.

To define the quality of location, we really need to understand the variables that influence location. This is especially true with mobile devices in the mix.

Quality of location accuracy has three dimensions:

  1. Location precision
  2. Refresh rate
  3. System latency

These three vectors are functions of how well the infrastructure is engineered and how the Read More »

Tags: , , , , , , ,

Unleash True Mobility with an Innovative IT Infrastructure

There’s an influx of conversation focused on Bring Your Own Device, the consumerization of IT and how organizations can cope in today’s multi-device environment.

IT and business leaders are being asked to securely connect thousands of devices competing for network resources; both wired and wireless while simultaneously supporting greater productivity in the workplace.

With this in mind, how can mobility be addressed at an infrastructure level to tackle challenges and enable opportunities for organizations and employees?

Recently, I participated in a Future of IT podcast episode with Craig Mathias, Principal at the Farpoint Group. We discussed how an IT infrastructure is key to enabling innovation and the role seamless mobility and why organizations should future-proof their mobility strategy through an infrastructure-centric approach.

One central theme from our discussion focused on the need for simple, intelligent, secure IT infrastructure. Read More »

Tags: , , , , ,

Cloud Managed Networking is the “Easy Button” for the Network

Let me start with a few ideas that should be pretty uncontroversial:

  • Digitization is transforming even the most old-school industries. Who would have thought the taxi cab business would get turned on its head by an app?
  • The old way of doing IT—where every company builds and maintains its own vast infrastructure—is going to change. For decades, survey after survey has said that companies spend 70 or 80 percent of their IT resources just to keep the lights on.
  • Companies want to shift their IT risk onto IT companies. They want to press the proverbial “big red ‘easy’ button” on their networks so they just work.

Cisco Meraki Cloud misconceptions 800x800 v2 (2)

Cisco is taking a giant step in that direction with Cisco-Meraki cloud managed IT. The idea—which should be pretty uncontroversial—is to make the network as easy to operate as your iPhone.

When Cisco acquired Meraki a couple of years ago, people thought of it as a company that supplied wireless networks to midsized businesses. But it’s never been just about Wi-Fi or small and medium-sized businesses.

Read More »

Tags: , , , , , , , , ,