By Lisa Garza, Marketing Manager
I had the pleasure of visiting this vibrant island country while we were filming this video. The Republic of Malta sits in the Mediterranean south of Sicily and north of Libya, a strategic crossroads with a visible history that dates back to thousands of years BC. Some of the oldest standing temples in Malta pre-date the Egyptian Pyramids by a millennium.
What a joy, then, to experience the thoroughly modern nation that Malta has become, thanks in part to the vision of the telecommunications provider Melita. The name Melita itself reflects the long history of the country – thought to derive from an ancient Greek word for “honey-sweet”, reflecting a unique species of bees that are found in Malta. Read More »
Tags: broadband, carrier, Melita, mobility, network, Service Provider, Smart Island, telecommunications, wifi
In this guest blog, Jacob Morgan, author, speaker and futurist, shares his vision for how the Internet of Everything will shape the day-to-day lives of future knowledge workers.
As evidenced by the results of Cisco’s 2014 Connected World Technology Report, the future of work will be more collaborative than ever before. As a result, the typical day of tomorrow’s knowledge worker will be dramatically different than it is today.
Consider this early morning scenario:
6:30 a.m. – Most of us today wake up to an alarm clock. But imagine your alarm clock is connected to your coffee maker that automatically starts brewing your coffee and is is connected to your car, which tells you when you need to leave for work based on traffic patterns and weather as you pour your first cup. Read More »
Tags: Cisco, Cisco 2014 Connected World Technology Report, Future of IT, future of work, Internet of Everything, internet of things, Jacob Morgan, mobility
Your mobile strategy needs to consider the user’s point of view and the highly dynamic nature of the mobile threat landscape. Weighing the threat risk includes evaluating the cost of insecure mobile devices.
User Point of View
The Cisco 2014 Connected World Technology Research tracked the users’ outlooks on the evolving work environment. Being mobile, off premise with your device was well noted.
• Most believe a flexible, mobile and remote work model is competitive.
• Over 25% work from organizations that allow working from home (WFH).
• Over 50% consider themselves available 24 hours 7 days.
• Most believe the most connected device for work will be the smartphone in 2020.
The trend for mobile remote work environments cannot be disputed but the mobile device threat vector expands to a broader range of access points. This puts your corporate resources at risk of being corrupted or stolen. Let’s consider the cost of an insecure mobile environment.
Read More »
Tags: byod, connected employee, mobility, security, UX
Our customers are continuing to feel the pain of having to increasingly support off-premise mobile devices like smartphones and tablets. The critical need to rapidly onboard these devices to connect to corporate services and applications pretty clearly provides business with a competitive advantage (Cisco Enterprise Mobility Landscape Wave II Study – April 2014) in improving workforce efficiency.
Consider the sales person who needs to check a customer order from his corporate- sanctioned tablet in the customer’s lobby. Look at the contractor with their personal smartphone who needs to access project emails from home.
What is the big problem? The rush to provide access to these off-premise devices means we have reduced or even discarded needed security controls when it comes to remote connectivity for mobile devices. Offering access from any device, any location, anytime, opens the door to potential security threats. The mobile endpoint is a threat vector with 68% of organizations saying their mobile devices were targeted by malware in the last 12 months (Ponemon Research.)
What if I secure these devices using VPN technology in the same way as laptops? While, ”Turning On” VPN on any endpoint means that all traffic and applications (personal and enterprise) are all transmitted over the same VPN channel to access corporate networks. This co-mingling of corporate and user apps allows the possibility of un-compromised user applications polluting corporate infrastructure and increases the risk of threats to the network.
So now what? I don’t want to enable VPN every single time I try to look up a document or use salesforce.com or access email. That increases the complexity for the user and gives them a reason to either find a way around the process or nullifies the efficiency business want to promote with their mobile workforce.
The answer lies with the introduction of Cisco AnyConnect 4.0 offering customers the ability to deliver per-application secure access for only approved corporate applications in way that is seamless to the user. By just clicking on the registered corporate application I want to use, I can automagically create a secure connection for JUST that application each time. This means I don’t mix access to corporate resources between authorized applications and potentially infected user applications. It even reduces bandwidth and IT resource usage since user applications do not get tunneled back to corporate and has to go through user networks (mobile or WiFi).
Enterprises want to empower their mobile users to work from anywhere while IT wants a simple way to control and secure enterprise access consistently across any device whether on or off-premise. AnyConnect continues to evolve to provide integrated and flexible security and access control for any remote and/or mobile endpoints.
To learn more how to better secure your remote endpoints, check out Cisco AnyConnect
Tags: anyconnect, future of mobility, mobile security, mobility, security
To address many questions about mobility, I am delighted to share with you our point-of-view through our “Cisco SPotlight Series,” an ongoing course of videos in which we answer questions and provide commentary on many hot topics in the service provider industry.
In this latest video, I reveal what mobile operators and their customers, including enterprises and end-users, can expect in 2015 as mobile Internet networks are increasingly becoming virtualized, and virtualization is increasingly becoming networked. Read More »
Tags: IoE, mobile internet, mobile operators, mobility, NFV, SDN, Service Provider, virtualization