Cisco Blogs


Cisco Blog > SP360: Service Provider

Roaming Data Plans: Culture Shock, maybe, but Bill Shock no more!

There is immense parental pride in seeing your child receive her University diploma. As I watched my daughter walk across the stage on the campus quad last year, bittersweet thoughts floated by – she’ll be leaving the family nest, striking out on her own, facing the challenges of finding a job, moving into her own apartment, paying bills. It was sad to think of innocence lost, and the real world barking at her door. With these thoughts I embraced her, and then she said “Dad, guess what, I’ve decided that I’m gonna do a gap year in New Zealand and Australia!”

A “gap year” is a way to defer all those serious milestones I was imagining for my daughter by taking a year off to travel and do fun things. Oh, and could I also take care of her cat, her car, and start making her college loan payments while she was gone? Oh well, I was actually very happy – and envious – about her quest for self-discovery.

So we shifted focus to new challenges, like getting travel medical insurance, selecting the right backpack, managing money needs, where to find jobs along the way, getting temporary work visas. And what about keeping in touch? I looked at my mobile operator’s roaming rates, and saw that Read More »

Tags: , , , , , , , , , , , ,

Thoroughly Modern Malta – Melita Furthers Malta’s Smart Island Vision with Carrier Wi-Fi

Lisa Garza Bio Pic

By Lisa Garza, Marketing Manager 

I had the pleasure of visiting this vibrant island country while we were filming this video. The Republic of Malta sits in the Mediterranean south of Sicily and north of Libya, a strategic crossroads with a visible history that dates back to thousands of years BC. Some of the oldest standing temples in Malta pre-date the Egyptian Pyramids by a millennium.

What a joy, then, to experience the thoroughly modern nation that Malta has become, thanks in part to the vision of the telecommunications provider Melita. The name Melita itself reflects the long history of the country – thought to derive from an ancient Greek word for “honey-sweet”, reflecting a unique species of bees that are found in Malta. Read More »

Tags: , , , , , , , ,

The Future Knowledge Worker

In this guest blog, Jacob Morgan, author, speaker and futurist, shares his vision for how the Internet of Everything will shape the day-to-day lives of future knowledge workers.

As evidenced by the results of Cisco’s 2014 Connected World Technology Report, the future of work will be more collaborative than ever before. As a result, the typical day of tomorrow’s knowledge worker will be dramatically different than it is today.

Consider this early morning scenario:

6:30 a.m. -- Most of us today wake up to an alarm clock. But imagine your alarm clock is connected to your coffee maker that automatically starts brewing your coffee and is is connected to your car, which tells you when you need to leave for work based on traffic patterns and weather as you pour your first cup. Read More »

Tags: , , , , , , ,

Insights for Remote Mobility

November 21, 2014 at 10:37 am PST

Your mobile strategy needs to consider the user’s point of view and the highly dynamic nature of the mobile threat landscape.  Weighing the threat risk includes evaluating the cost of insecure mobile devices.

User Point of View

The Cisco 2014 Connected World Technology Research tracked the users’ outlooks on the evolving work environment.  Being mobile, off premise with your device was well noted.
•    Most believe a flexible, mobile and remote work model is competitive.
•    Over 25% work from organizations that allow working from home (WFH).
•    Over 50% consider themselves available 24 hours 7 days.
•    Most believe the most connected device for work will be the smartphone in 2020.
The trend for mobile remote work environments cannot be disputed but the mobile device threat vector expands to a broader range of access points. This puts your corporate resources at risk of being corrupted or stolen. Let’s consider the cost of an insecure mobile environment.

Read More »

Tags: , , , ,

Minimize Threats from Non-Corporate Mobile Apps

November 14, 2014 at 7:18 am PST

Our customers are continuing to feel the pain of having to increasingly support off-premise mobile devices like smartphones and tablets. The critical need to rapidly onboard these devices to connect to corporate services and applications pretty clearly provides business with a  competitive advantage (Cisco Enterprise Mobility Landscape Wave II Study – April 2014) in improving workforce efficiency.

Consider the sales person who needs to check a customer order from his corporate- sanctioned tablet in the customer’s lobby.  Look at the contractor with their personal smartphone who needs to access project emails from home.

What is the big problem? The rush to provide access to these off-premise devices means we have reduced or even discarded needed security controls when it comes to remote connectivity for mobile devices. Offering access from any device, any location, anytime, opens the door to potential security threats.  The mobile endpoint is a threat vector with 68% of organizations saying their mobile devices were targeted by malware in the last 12 months (Ponemon Research.)

What if I secure these devices using VPN technology in the same way as laptops? While, ”Turning On” VPN on any endpoint means that all traffic and applications (personal and enterprise) are all transmitted over the same VPN channel to access corporate networks.  This co-mingling of corporate and user apps allows the possibility of un-compromised user applications polluting corporate infrastructure and increases the risk of threats to the network.

So now what? I don’t want to enable VPN every single time I try to look up a document or use salesforce.com or access email. That increases the complexity for the user and gives them a reason to either find a way around the process or nullifies the efficiency business want to promote with their mobile workforce.

The answer lies with the introduction of Cisco AnyConnect 4.0 offering  customers the ability to deliver per-application secure access for only approved corporate applications in way that is seamless to the user.  By just clicking on the registered corporate application I want to use, I can automagically create a secure connection for JUST that application each time. This means I don’t mix access to corporate resources between authorized applications and potentially infected user applications. It even reduces bandwidth and IT resource usage since user applications do not get tunneled back to corporate and has to go through user networks (mobile or WiFi).

PerAPP

Enterprises want to empower their mobile users to work from anywhere while IT wants a simple way to control and secure enterprise access consistently across any device whether on or off-premise.   AnyConnect continues to evolve to provide integrated and flexible security and access control for any remote and/or mobile endpoints.

AC

 

 

 

 

To learn more how to better secure your remote endpoints, check out Cisco AnyConnect

Tags: , , , ,