Cisco Blogs


Cisco Blog > Security

Securing Mobile Data: What’s Your Plan?

July 24, 2014 at 7:00 am PST

As a business or technical leader, you know you need to protect your company in a rapidly evolving mobile ecosystem. However, threats are not always obvious. As malware and attacks become more sophisticated over time, business decision makers must work with technical decision makers to navigate security threats in a mobile world.

This blog series, authored by Kathy Trahan, will explore the topic of enterprise mobility security from a situational level and provide insight into what leaders can do now to mitigate risk. To read the first post focused on securing device freedom, click here. The second post, available here, focused on the risks that come with mobile connections. – Bret Hartman, Chief Technology Officer (CTO) for Cisco’s Security Technology Group

The Cisco Visual Networking Index revealed an obvious truth that none of us can deny—mobile data traffic is on the rise and shows no signs of stopping:

  • By 2018, over half of all devices connected to the mobile network will be “smart” devices
  • Tablets will exceed 15 percent of global mobile data traffic by 2016
  • By the end of this year, the number of mobile-connected devices will exceed the number of people on earth, and by 2018, there will be nearly 1.4 mobile devices per capita

With the explosion in the number of smart mobile devices and employees increasingly taking advantage of BYOD, securing company and personal data in a world where the mobile endpoint is a new perimeter presents technical and legal challenges for organizational leaders.

What are some of the most prevailing challenges? The personal use of company-owned devices happens more frequently than IT may realize and a complex legal environment can leave both employees and IT confused on how personal privacy is being protected. It is important for human resources to weigh in here as well.

Read More »

Tags: , , , , , , ,

Third Time’s A Charm: Cisco is a Leader in the Gartner Magic Quadrant for Wired and Wireless LAN Access Infrastructure Again!

Gartner has released their 2014 Magic Quadrant for Wired and Wireless LAN Infrastructure.  For the 3rd year in a row, Cisco is recognized as a leader in both vision and execution.  We believe this Gartner recognition is validation of Cisco strategy and investments for unified access, policy management and cloud managed solutions.

Cisco’s position in the Wired and Wireless Gartner MQs has been consistent over the past 3 years as the market landscape has shifted we believe validating our commitment to meeting shifting customer priorities and requirements.

Qartner Magic Quadrant 2014
This graphic was published by Gartner, Inc. as part of a larger research document and should be evaluated in the context of the entire document. The complimentary copy of the Gartner document is available to view here.

The 2014 Gartner Magic Quadrant for the Wired and Wireless LAN Access Infrastructure (Authors: Tim Zimmerman, Andrew Lerner, Bill Menezes; Published 26th June 2014) reflects the evolution from prior years and highlights what customers are looking for:

With limited growth in IT resources, administrators require one network management application, one access security solution, one guest access application or one policy enforcement solution with the flexibility to be deployed in a public cloud, private cloud or on-premises. This integration reduces the costs associated with the upfront capital expense of multiple network service applications each dedicated to either the wired infrastructure or the wireless or cloud components. This savings is also extended to the ongoing software maintenance costs of all access layer management, security and policy enforcement components.”

What Does Being a Leader Mean?  Read on for the full story Read More »

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

Mobility’s Place in the Internet of Things

It’s estimated that the number of mobile-connected devices will exceed the world’s population by the end of this year. That is a tremendous amount of connections and as more devices enter the market, the way people, processes, data, and things – the Internet of Everything – connect will change everything about how we do business and live our lives.

Mobility is the power-player when it comes to the future of the Internet of Everything, revolutionizing everything from our shopping habits to healthcare innovations. In this blog, Mala Anand, Senior Vice President, Cisco Services Platforms Group, outlines the importance of mobility as an Internet of Things driver and how these “things” are essential to the success of the Internet of Everything.

Be sure to read the first blog in this series by Rachael McBrearty, Chief Creative of the Cisco Internet Business Solutions Group, about the Nexus of the Internet of Everything.

The Internet of Things (IoT) is on course to exponentially grow in the coming years, with more than 30 billion devices installed by 2020. And this count doesn’t include the “standard” items such as PCs, tablets, and smartphones!

We have already seen how IoT innovations can connect homes, linking light bulbs, locks, thermostats, and more. We have even seen networks make their way under water to the ocean floor. And during this year’s Cisco Live, mobile phone notifications, sensors on streetlights and recycling bins and other smart technology gave attendees insight into the fluidity of a connected city, as these “things” spoke to each another.  These innovations are fascinating, but the question still remains -- what’s next?

Read More »

Tags: ,

New Edge Devices are Having a Cascade Effect on Public Sector IT Consumption

Multiple changes are on the horizon for public sector information technology managers. Over the next two years, IT organizations could be heavily impacted by these transformations, via a very distinct series of events.  Government and education CIOs, program managers, and business process planners will need to keep an eye on these looming changes as they embark on long-range IT plans.

IDC Government Insights recently worked with Cisco to develop a detailed InfoBrief –  as a way of highlighting these crucial issues. It’s titled Public Sector Reacts Positively to the Changes in IT Consumption.

Read More »

Tags: , , , , , , ,

The Risk of Remote Connection: What’s Your Plan?

July 17, 2014 at 6:00 am PST

As a business or technical leader, you know you need to protect your company in a rapidly evolving mobile ecosystem. However, threats are not always obvious. As malware and attacks become more sophisticated over time, business decision makers must work with technical decision makers to navigate security threats in a mobile world.

This blog series, authored by Kathy Trahan, will explore the topic of enterprise mobility security from a situational level and provide insight into what leaders can do now to mitigate risk. To read the first post focused on securing device freedom, click here. – Bret Hartman, Chief Technology Officer (CTO) for Cisco’s Security Technology Group

Imagine two of your executives are using a SaaS platform while working off an unsecure hotel Wi-Fi network nearby. Did you know that SaaS and B2B applications are 15 times more likely than pornography to deliver malicious content across a network?

The threats against a remote connection are unfortunately very real and using an unprotected network to access company assets (whether on-premise or in the cloud) can have serious consequences.

As the growth of mobility and cloud blur the lines of our personal and business lives, the “mobile cloud” has drawn users (consumer or employee) to its convenience. According to a recent Gallup poll, nearly 80% of workers had positive feelings for using their own computers and mobile devices to stay connected to work outside of normal business hours.

For IT, the mobile cloud offers huge management efficiencies. Recent Cisco mobility research confirms that mobility strategies are converging with cloud strategies. However, it also forces IT and business leaders to find a happy medium between encouraging corporate productivity and addressing a new wave of security concerns. From the same research, nearly half of the organizational leaders surveyed say security risks can prevent them from moving forward with mobility initiatives.

Despite these risks, It is hard to dispute that off premise access provides significant productivity gains especially as organizations see mobility as a competitive edge to embrace.

As more mobile users enter the market, (over half a billion devices were added just last year) and the number of remote workers becomes more ubiquitous, the expectation is that networks and access should be the same, regardless of location.

Read More »

Tags: , , , ,