Your mobile strategy needs to consider the user’s point of view and the highly dynamic nature of the mobile threat landscape. Weighing the threat risk includes evaluating the cost of insecure mobile devices.
User Point of View
The Cisco 2014 Connected World Technology Research tracked the users’ outlooks on the evolving work environment. Being mobile, off premise with your device was well noted.
• Most believe a flexible, mobile and remote work model is competitive.
• Over 25% work from organizations that allow working from home (WFH).
• Over 50% consider themselves available 24 hours 7 days.
• Most believe the most connected device for work will be the smartphone in 2020.
The trend for mobile remote work environments cannot be disputed but the mobile device threat vector expands to a broader range of access points. This puts your corporate resources at risk of being corrupted or stolen. Let’s consider the cost of an insecure mobile environment.
Read More »
Tags: byod, connected employee, mobility, security, UX
Our customers are continuing to feel the pain of having to increasingly support off-premise mobile devices like smartphones and tablets. The critical need to rapidly onboard these devices to connect to corporate services and applications pretty clearly provides business with a competitive advantage (Cisco Enterprise Mobility Landscape Wave II Study – April 2014) in improving workforce efficiency.
Consider the sales person who needs to check a customer order from his corporate- sanctioned tablet in the customer’s lobby. Look at the contractor with their personal smartphone who needs to access project emails from home.
What is the big problem? The rush to provide access to these off-premise devices means we have reduced or even discarded needed security controls when it comes to remote connectivity for mobile devices. Offering access from any device, any location, anytime, opens the door to potential security threats. The mobile endpoint is a threat vector with 68% of organizations saying their mobile devices were targeted by malware in the last 12 months (Ponemon Research.)
What if I secure these devices using VPN technology in the same way as laptops? While, ”Turning On” VPN on any endpoint means that all traffic and applications (personal and enterprise) are all transmitted over the same VPN channel to access corporate networks. This co-mingling of corporate and user apps allows the possibility of un-compromised user applications polluting corporate infrastructure and increases the risk of threats to the network.
So now what? I don’t want to enable VPN every single time I try to look up a document or use salesforce.com or access email. That increases the complexity for the user and gives them a reason to either find a way around the process or nullifies the efficiency business want to promote with their mobile workforce.
The answer lies with the introduction of Cisco AnyConnect 4.0 offering customers the ability to deliver per-application secure access for only approved corporate applications in way that is seamless to the user. By just clicking on the registered corporate application I want to use, I can automagically create a secure connection for JUST that application each time. This means I don’t mix access to corporate resources between authorized applications and potentially infected user applications. It even reduces bandwidth and IT resource usage since user applications do not get tunneled back to corporate and has to go through user networks (mobile or WiFi).
Enterprises want to empower their mobile users to work from anywhere while IT wants a simple way to control and secure enterprise access consistently across any device whether on or off-premise. AnyConnect continues to evolve to provide integrated and flexible security and access control for any remote and/or mobile endpoints.
To learn more how to better secure your remote endpoints, check out Cisco AnyConnect
Tags: anyconnect, future of mobility, mobile security, mobility, security
To address many questions about mobility, I am delighted to share with you our point-of-view through our “Cisco SPotlight Series,” an ongoing course of videos in which we answer questions and provide commentary on many hot topics in the service provider industry.
In this latest video, I reveal what mobile operators and their customers, including enterprises and end-users, can expect in 2015 as mobile Internet networks are increasingly becoming virtualized, and virtualization is increasingly becoming networked. Read More »
Tags: IoE, mobile internet, mobile operators, mobility, NFV, SDN, Service Provider, virtualization
So over the past year, there has been lots of press about the Internet of Things (IoT) and there has been information on the Connected Car and Telematics, Connected Transportation, Connected City, Connected Everything… But just how do we connect all of these devices? Magic? Why do we care?
Well according to Goldman Sachs there will be:
If we examine these “28 Billion reasons” a little deeper using the recent Cisco Global Cloud Index (GCI) we find that the average number of devices an Internet User uses will grow substantially by 2018. Read More »
Tags: AT&T Digital Life, AT&T Kevin Petersen, Cisco Quantum™ Virtualized Packet Core, Doug Webster, EPC, Evolved Packet Core, GCI, global cloud index, Home Security, IoT, IOT Cloud Connect, iot world forum, Jim O’Leary, M2M, mobility, Orange, Orange François Duquesnoy, packet core, PMB, Premium Mobile Broadband, Service Provider, Sprint, Sprint Mohamad Nasser
Cisco’s 2014 Future of Work survey results were published the other day and reveal many thought-provoking trends.
For example, did you know that the majority of today’s professionals would relinquish their television before they let you take away their smartphone? Or that given a choice between Internet access and sense of smell, an incredible 43% would hang on to the Internet. Now there’s the true meaning of a 6th sense.
These are just a couple of the provoking (and some may say disturbing) findings.
Read More »
Tags: beyond byod, byod, digital workplace, future of work, Gen-Y, mobile workspace, mobility, security