Cisco Blogs


Cisco Blog > Enterprise Networks

Beyond BYOD to Workspace Mobility

Today I’d like to share some thoughts on Cisco’s approach to Business-to-Employee (B2E) mobility and draw attention to today’s mobility announcements.

After more then ten years working on the amazing roller coaster called Cisco Data Center, most recently leading marketing for our desktop virtualization solutions, I was looking for something different and equally exciting to dig my teeth into. As fate would have it there was an opportunity to help drive Cisco’s fast evolving Enterprise Mobility strategy. It shouldn’t be surprising to anyone that mobility is a big deal at Cisco today. We’re all experiencing the impact of mobile devices in our private lives -- and now more and more in the workplace too.

IT’s approach to mobile is changing too. Changing from “Look out! There’s a tsunami of mobile devices coming our way!” to “This mobile thing could really help make our organization more agile and our employees more productive and happy – let’s get in ahead of the tsunami and make it work for us.”

A recent Cisco mobility survey really brings this home. According to the survey, of the 400 mid-market and enterprise IT decision makers from the U.S. surveyed, 51% already had an organization-wide mobility strategy. Of those with a strategy, 63% actually thought having a strategy was helping them simplify their mobility projects. In another recent mobility survey, this time from Accenture, of 400 global IT decision makers, 73% said that mobility will impact their business as much as or more so than the web did!! That says it all.

I believe that mobility is a journey that every organization is making at its own pace. At Cisco we refer to this as the Mobile Workspace journey.

Mobile Workspace Solution Journey

The journey often starts with just simply securing mobile devices and their access to the corporate network, the device-focused phase. Whether corporate-liable devices or employee-owned (BYOD) or guest devices, IT’s first need is to provide an easy way to on-board them and let them get to the resources they are authorized to access. Read More »

Tags: ,

Mobile Trends & Airport Passenger Terminal Expo 2014

airport passenger expo 0The annual Passenger Terminal EXPO is underway this week in Barcelona. The event provides a powerful international platform for the airport and airline sectors to interact and share common issues, goals and solutions about the airport industry, with a particular and unique focus on the terminal.

Cisco’s partner SITA has a very strong presence at the event with various speakers on the industry trends as well as booth and demos. One of these is the iFlow platform which uses Cisco’s MSE as a core component.

The Airport industry is one of the most researched industries with very solid and proven metrics and clear ROI measures. Some interesting statistics recently reported include:

Airport IT Investment trends:

  • IT spending in Airports has grown by 12% CAGR since 2010,
  • with IT spend in Airports in 2013 representing 5.43% of their revenues (up from 4.9% in 2012)
  • 90% of Airport CIO’s (or technology chiefs) expect further increases in 2014 and beyond. Read More »

Tags: , , , , , , , , , , , , , , , , , , , , , , ,

Mobile Marketing @ SES Jakarta & WiFi based Location Context

SES ( soon to be called ClickZ) hosted a Digital Marketing Conference in Jakarta this week which is the meeting point for digital marketing and advertising professionals in the AP region.
Here the  latest mobile marketing trends, best practices, new technologies have been discussed and presented, including Cisco’s CMX capabilities as part of meet the experts session called “Context marketing using Wifi location services”.

SESjakartaSome interesting observation and ideas being discussed include:

Multi-Channel Attribution modeling:
While online marketing investments are more measurable compared to conventional media such as television, however tracking what leads to sales conversion is becoming increasingly complicated.
The simple measures of last click or first click attribution are not fully meaningful to represent today’s omni-channel ultra-connected consumer. Therefore it’s not surprising that multi-channel tools and attribution modeling are one of the hot topics in digital analytics.

Data to underpin a successful digital marketing strategy:
Increasingly consumers are connected all the time -- and with that every day around the world, connected consumers are being wooed by offers of better prices, better deals and better service.
How can marketers compete…often the only defence they think they have to fire back at competitors is to match those deals and price cuts.
However data is key, as more information about customers becomes more plentiful and more detailed, and as customers become more interactive with the companies they buy from, the competitive marketing landscape is becoming radically different. For many advanced organisations it is using data to deliver insight and analysis gives them a competitive edge to keep ahead of the pack. Read More »

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

Ask The #IoE Futurist: “In an Internet of Everything World, Will the Smartphone Become Superfluous?”

In my role as Cisco’s Chief Futurist, I get many questions about what the future holds and how new technology and emerging solutions will change our lives. Given the positive feedback and the volume of questions being submitted from the community around the first series, I’ve decided to do another series to answer questions from the education and tech community around the Internet of Everything (IoE). Whether the questions are global in scope, such as how the Internet of Everything will shape our world, or small in nature, like our most recent Ask the #IoE Futurist question about batteries or today’s question about the smartphone becoming superfluous, I enjoy the challenge of answering them all.

A few weeks ago, brand new smartphones and wearable smartgear products were unveiled at Mobile World Congress in Barcelona. While many of the specs and capabilities of these emerging devices vary from manufacturer to manufacturer, they all represent a common theme: mobile devices are not only becoming more present in our daily lives, but also changing how we connect, interact and share experiences.

As the Internet of Everything (IoE) drives more connected things, data, people and processes, how will the future of smartphones evolve? Will the endless possibilities for connected cars, shoes and dishwashers mean that the smartphone becomes one extra device for us to carry?

In this Ask the #IoE Futurist post, I’ll answer a question from John Spade (@DaSpadeR), a Cisco Champion, about how smartphones might change in an IoE world. Here is John’s question:

Question: “The smartphone lets us bring the Internet with us, but in the Internet of Everything, will the smartphone itself become superfluous?”

Read More »

Tags: , , , , , , , ,

Summary: Navigating Security Threats in a Mobile World

Security plays an important role in the success of mobility implementations worldwide. We assume security threats are always present, however it’s not always apparent where threats may arise from. Being aware of these potential risk areas is crucial.

Business decision-makers must gain insight into where these breaches are occurring. They should also understand why it is important for them to care, and how they can be aided by technical decision-makers to solve these issues moving forward.

Here’s a brief look into the where, the why and the how of embracing a secure approach to enterprise mobility and what it means for business leaders.

Cisco_NavigatingSecurityMobileWorld

Where are security threats? Today’s organizations are facing a greater attack surface as advanced mobile devices and public cloud services foster new attack models and increasing complexity within networks. To cover the entire attack continuum, organizations need to address a broad range of attack vectors with solutions that operate everywhere the threat can manifest itself: on the network, on traditional endpoints, on mobile devices, and in virtual environments.

How can threats be thwarted? The best approach is a proactive one, rather than a reactive one, especially when many organizations may not know when they are under attack. Business leaders must work with IT teams to institute a formal program for managing mobile devices and to ensure that any device is secure before it can access the network.

Why does a balanced approach to mobile security matter? In a recent blog post, I discussed the need for organizations to deploy a balanced approach to mobile security. This approach should focus more on protecting the network and proprietary data and less on implementing overly broad restrictions. IT needs to approach security with a user experience mentality. After all, if you overly manage devices, your adoption will be low and so will your return on investment (ROI). This approach can lead to greater opportunities to align threat intelligence and security best practices.

To learn more about this balanced approach to mobile security, read the full blog: Navigating Security Threats in a Mobile World.

Tags: , , , , , , , , , , , , ,