Cisco Blogs


Cisco Blog > Mobility

Summary: Navigating Security Threats in a Mobile World

Security plays an important role in the success of mobility implementations worldwide. We assume security threats are always present, however it’s not always apparent where threats may arise from. Being aware of these potential risk areas is crucial.

Business decision-makers must gain insight into where these breaches are occurring. They should also understand why it is important for them to care, and how they can be aided by technical decision-makers to solve these issues moving forward.

Here’s a brief look into the where, the why and the how of embracing a secure approach to enterprise mobility and what it means for business leaders.

Cisco_NavigatingSecurityMobileWorld

Where are security threats? Today’s organizations are facing a greater attack surface as advanced mobile devices and public cloud services foster new attack models and increasing complexity within networks. To cover the entire attack continuum, organizations need to address a broad range of attack vectors with solutions that operate everywhere the threat can manifest itself: on the network, on traditional endpoints, on mobile devices, and in virtual environments.

How can threats be thwarted? The best approach is a proactive one, rather than a reactive one, especially when many organizations may not know when they are under attack. Business leaders must work with IT teams to institute a formal program for managing mobile devices and to ensure that any device is secure before it can access the network.

Why does a balanced approach to mobile security matter? In a recent blog post, I discussed the need for organizations to deploy a balanced approach to mobile security. This approach should focus more on protecting the network and proprietary data and less on implementing overly broad restrictions. IT needs to approach security with a user experience mentality. After all, if you overly manage devices, your adoption will be low and so will your return on investment (ROI). This approach can lead to greater opportunities to align threat intelligence and security best practices.

To learn more about this balanced approach to mobile security, read the full blog: Navigating Security Threats in a Mobile World.

Tags: , , , , , , , , , , , , ,

Cisco Mobility Services Engine with Enhanced Wi-Fi Location Accuracy and Analytics: Best of Interop 2014 Finalist

Cisco has been placing a lot of emphasis on delivering solutions that provide insights and understanding on how customers, patients, visitors and communities interact with their physical environments. Mobility and leveraging mobile devices in the environment has revealed itself as a very powerful way to gather critical business intelligence. This business intelligence is highly impacted by the resolution of the location-data and the demand to improve resolution and accuracy is increasing quickly.  Apparently, this has not been missed by UBM. This year Cisco is honored to be selected as a Best of Interop Finalist for the Wireless award category for our innovations in improving location data resolution calculations.

best of interop 2014

It’s an honor to be recognized for our innovation and technological advancements in wireless, and we wanted to share a bit more about our submission with you.

What are Location Data Resolution Calculations?

Many systems acquire location analytics by relying solely on the probing that occurs from a mobile device to an access point. Unfortunately, this approach is delivering diminishing returns. It puts location analytics at the mercy of the mobile device vendors. What I mean by this is that as mobile device manufacturers look to improve mobile devices in regards to OS, drivers and battery life they are reducing the frequency of the probing from the mobile device. In addition, different mobile device manufacturer use different probing intervals. The need to do this makes sense from the mobile device manufacturer perspective, but it has an impact on the accuracy of the data acquired when representing movement of end users in the physical environment. If a user is recognized when they walk in the environment and then is identified a minute later, there is a lot of movement that can occur in that time.  But the analytics only sees two data points and draws a straight line. Not a very accurate representation.

Cisco is leveraging what we know best, the network, to supplement the device probing. Bringing in network data allows us to gather higher data resolution regarding mobile device movement, equating to a more accurate representations of end user movement in the environment.

Why is This Important? Read More »

Tags: , , , , , , , , , , , , , , , , , , , , , , , , ,

High-Tech Hotel Receives Cisco Upgrade and “Powers Up” Guest Experience

Traveling can be stressful – for business or leisure – and hoteliers do their best to make sure that the hotel in which you choose to stay during your time away from home provides the best worry-free conveniences available.  High-tech hotels are taking steps in the right direction by offering in-room automation, loyalty perks, mobile check-ins and more to enhance the guest experience.

But even luxury, high-tech hotels need upgrades sometimes.  To validate this point, we look back at Boston in March 2012 at an event referred to as the ‘Back Bay blackout.” Unfortunately, an electrical fire in Boston left thousands without power. I imagine the scene was a little chaotic without lights, phones and Internet. The Mandarin Oriental, Boston and its guests were also left without access to phones or Internet during this power outage. Read More »

Tags: , , , , , , ,

Navigating Security Threats in a Mobile World

Security plays an important role in the success of mobility implementations worldwide. We assume security threats are always present; however, it’s not always apparent where threats may arise from. Being aware of these potential risk areas is crucial.

Since mobility solutions offer users the ability to use devices on a range of networks and in a wide array of places, threats may come in unsuspected ways, or be inadvertently introduced into your enterprises network. For example, one recent study reveals that 80 percent of corporate security professionals and IT leaders recognize that “end user carelessness” constitutes the biggest security threat to an organization.

In addition, information from the Cisco 2014 Annual Security Report sheds light on the persistent security attacks that enterprises face. From hackers to malicious malware, it’s clear that security threats arise from unsuspecting places.

Given this knowledge, business decision-makers must gain insight into where these breaches are occurring. They should also understand why it is important for them to care, and how they can be aided by technical decision-makers to solve these issues moving forward. In this post I’ll discuss the where, the why and the how of embracing a secure approach to enterprise mobility and what it means for business leaders.

Read More »

Tags: , , , , , , , , , , , , ,

How the Internet of Everything Will Shape the Next 25 Years of Internet History

This week marks the 25th anniversary of the World Wide Web, an important milestone as we look at how far we’ve come and how the Internet of Everything (IoE) is shaping our future.

Developed by Sir Tim Berners-Lee, a researcher at CERN, the Web was borne from the need to keep track of complex, large-scale projects without the loss of important information. We’ve come a long ways since March 1989, when Berners-Lee published his idea of “linked information systems.”

Today, IoE is driving connections beyond just data. The convergence of connecting people, things, data and processes is transforming organizations, industries and our lives. The growth of mobility and cloud computing is further driving innovation and an increase in the number and kinds of connections.

Cisco Internet 25

To illustrate this transformation, let’s take a quick look at life just two decades ago. According to a new national survey to mark the 25th anniversary of the Web, Pew Research revealed that in 1995, 42 percent of U.S. adults had never heard of the Internet and an additional 21 percent were vague on the concept—they knew it had something to do with computers and that was about it. In addition, 20 years ago, only 14 percent had access to the Internet.

Read More »

Tags: , , , , , , , , ,