Cisco Blogs


Cisco Blog > Mobility

Ready for #SuperMobility?

It’s no longer a question of whether mobility best practices and policies are required, it’s a matter of when your strategy will get ahead of the unstoppable trend. Business and IT leaders alike are not just witnessing the movement of everything mobile, but guilty themselves: who isn’t on their devices for both work and play anymore?

User experience, performance, security and management are key red flags that shoot up when we think about mobile. Getting these four totems right will help organizations keep employees or customers happy and productive, while protecting the business. This is no piece of cake: mobility is a journey and you need a strategy.

Thought leaders and innovators across industries are converging on #SuperMobility Mobile Con this week in Vegas to discuss best practices and ways for organizations to tackle these key issues. We’ll be there too to discuss how to move beyond BYOD and develop an enterprise mobility strategy.

Session: Embark on Your Employee and Customer Mobility Journey
Time: Sep. 09, 2014 from 3:30 PM to 4:29 PM
Location: Sands Expo − MobileCON Show Floor, Stage 3 Read More »

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

Securing Mobile Data in the Event of Device Loss or Theft

As a business or technical leader, you know you need to protect your company in a rapidly evolving mobile ecosystem. However, threats are not always obvious. As malware and attacks become more sophisticated over time, business decision makers must work with technical decision makers to navigate security threats in a mobile world.

This blog series, authored by Kathy Trahan, will explore the topic of enterprise mobility security from a situational level and provide insight into what leaders can do now to mitigate risk. To read the first post focused on securing device freedom, click here. The second post, available here, focused on the risks that come with mobile connections. Kathy’s third post outlined three top considerations leaders must consider when examining their current mobile data security plan. The fourth post in this series highlights how security compliance is necessary for real-time mobile data access. – Bret Hartman, Chief Technology Officer (CTO) for Cisco’s Security Technology Group

Many of us have experienced that panicked “oh no!” moment when we’ve misplaced a mobile device or worse, found out it was stolen. The stakes are raised even higher when a lost or stolen device is company issued, or a personal device an employee uses for business purposes and contains sensitive data.

According to a recent report, more than 3.1 million smart phones were stolen just in America last year alone. This same report revealed that 34% of people took no security measures at all to protect sensitive information – not even a simple four-digit password. 51% of end users use their smartphone to perform daily business activities.

Read More »

Tags: , , , , ,

Show Me the Retail Data

retailSuccess in retail often comes down to a counting game.  How many people pass by your store?  How many come inside?   How long do they stay?  And most importantly how many ultimately buy?

Today, the retail counting game has gotten a lot easier because we can now count devices as proxies for people, since many potential customers today, myself included, won’t leave home without their smartphone.  As soon as they enter a store, the beacon on their cell phone effectively announces its arrival to the Wi-Fi network and voilà, we have a count.

With the help of CMX Presence Analytics, these smart devices can help answer many key retailing questions with a single access point.

  • Who?
    Who is passing by the store versus coming in?  Presence Analytics uses both the cell phone’s signal strength as well as the time spent in the area to determine the number of people walking by versus in-store visitors.  Presence Analytics provides simple, quick reports on retail conversion metrics.   You can also track how often visitors return to a store in a given time period can be tracked, which can be key for customer loyalty programs.

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

How to Make Money from Smart Cities

As cities around the world grow in size, we are beginning to see that strained resources, infrastructure, and services are causing natural limits to urban growth, which in turn limits the economic growth opportunity.  To combat this, cities as diverse as Barcelona, Nice, Kansas City and Songdo in South Korea, are starting to leverage advanced technologies and data analysis to create smart, connected cities.  These cities, and others around the globe, are building out new digital services such as smart lighting, traffic, waste management and data analytics to reduce costs, tap new sources of revenue, create new innovation business districts and improve the overall quality of urban life.

Not only will the creation of smart cities generate huge value for the cities and their inhabitants, but great opportunities will also exist for the vendors and partners who help to create and operate these digitally smart cities of the future.  However, the question is where and how can partners such as infrastructure providers, technology and services companies, and communication providers participate?  And, what types of revenues can they generate from helping to create smart cities?

Based on Read More »

Tags: , , , ,

Midsize Auctioneer’s Network is Fast and Fortified as Hundreds of Clients Bid Billions

Forget the best of both worlds. Ritchie Bros Auctioneers have found the best of three worlds with their network. This midsize company enables fast, secure bidding for customers, provides hassle-free mobile access for employees, and detailed network reports with no effort for IT.

Ritchie Bros. Auctioneers is the world’s largest auctioneer of heavy equipment and trucks. They sell billions of dollars of unused and used equipment at hundreds of unreserved public auctions each year. What’s even more impressive is that they are able to do this with only 1300 employees worldwide.

Auctions are very time sensitive and require a synchronized effort. This leaves little room for errors and interruptions.  Read More »

Tags: , , , , , , , , , , , , , , , , , , , , ,