There’s no question that more people around the world are connecting to wireless networks at home, work and play via mobile devices, such as smartphones and tablets. This rise in mobile device usage begs the question: How soon will it be (if not already) before these mobile devices dominate the mobile network, especially in the workplace?
Just recently, I read an article in Forbes, by Louis Columbus, that addresses the issue of increased mobile devices and unprepared network infrastructures. The article examines a study by IDC that predicts that 87% of sales for connected devices will be tablets and smartphones in next four years. As many employees prefer working from their own mobile devices, corporate networks, as they’re currently designed, will not be capable of successfully managing such a large volume of mobile data traffic generated by these mobile devices. With such expansive growth expected, the majority of businesses will either need to adapt an existing strategy to support this increase in mobile devices or adopt a new strategy.
Currently, there is a clear need for enterprises to better prepare and invest in their IT infrastructure. As more employees use their own devices at work for business and personal use, it’s imperative that business organizations require a secure mobile device and BYOD strategy to accommodate their business needs and employee preferences. However, the decision to adopt BYOD comes with a set of challenges for IT organizations.
Many of the benefits of BYOD, such as having the choice of device and anywhere, anytime access, are somewhat adverse to traditional IT requirements for security and support. In the past, IT pre-determined a list of approved workplace devices, typically a prescribed desktop, laptop, and perhaps even a small, standardized set of mobile phones and smartphones. Employees could choose among these devices, but generally were not permitted to stray from the approved devices list. With BYOD, IT has to approach the problem differently. Read More »
Tags: bring your own device, business transformation, byod, Cisco, enterprise mobility, mobile, mobile device, mobility, network, wi-fi, wifi, wireless, wireless network
DNS is like the town gossip of the network infrastructure. Computers and apps ask DNS questions and you can ask DNS who has been asking to resolve malware domains. When internal trusted systems are using DNS to resolve the names of known malware sites, this can be an Indicator of Compromise and a warning to clean the potentially infected systems and block traffic to the domain.
Blacklisting the known malware domains using local RPZs, firewalls, Cisco IronPort Web Security Appliance (WSA), or Cloud Web Security (CWS) is a great way to add an extra level of security in organizations. But what if you are just getting started in the process of cleaning systems and just need some situational awareness? Or, how can you manually check to see if these devices are working as expected? How can you determine independently of security devices, and at any point in time, that client systems are not reaching out to malicious domains? You can use dig but this post focuses on a Python example. Let’s first take a look at some DNS mechanics.
Read More »
Tags: dns, malware, ncsam-2013, network, security
One of the basic tenants of enterprise mobility is its direct influence on “now”.
When organizations implement mobile policies like BYOD and virtualized desktops, day-to-day operations can immediately improve. In most cases, the rate of return on seeing change is direct. However, the impact of enterprise mobility is not short-lived.
Recently, we counted down the “Six Essential Steps for Unleashing the Power of Enterprise Mobility.” Throughout the series, we provided a guide for enterprises to follow to implement broader mobility. We discussed how businesses could benefit now by untethering their global workforce and increasing productivity. The series highlighted a tactical approach to mobility, yet we would be amiss not to discuss the long-term transformational impact mobility can have on businesses. How can mobility be a catalyst for organizational growth and innovation?
Last week, I read an IT Web article by Johannesburg-based Lebo Mashiloane that discussed how BYOD and mobility are fueling enterprise growth. The article brought up a concept that is always important to keep top-of-mind: How today’s technology solutions are changing the landscape of tomorrow. Read More »
Tags: bring your own device, byod, Cisco, enterprise mobility, mobile, mobile device, mobility, network, wi-fi, wifi, wireless, wireless network
Big data seems to be everywhere these days. Everywhere you look there are new companies and technologies that promise to crunch up enormous databases and instantly extract from them knowledge and understanding. Although that sounds impressive, it raises the question – how can that help me and my business? How does fitting an N degree polynomial to a CRM database help me grow my business?
At Cisco, we’ve taken a very practical approach to big data. We started by asking our customers: what do they want to know? What information would help our customers’ better manage their sites, optimize their operations and grow their business? We took those questions and built Connected Mobile Experiences (CMX) Analytics around them.
Wouldn’t a store manager want to know how many of his customers were new? Did that new marketing campaign launched last month really drive new visitors to the store? Or another example, let’s say the layout of the store was just changed, wouldn’t the manager want to know if it was effective? Did people spend more time in the store? How about better understanding your customer base? Which web sites do my visitors visits? And of course retail isn’t the only segment that would like to know things. Wouldn’t an airport want to know how long people wait in the security line? Would a train station like to know how long before the train leaves people come into store?
Cisco’s CMX Analytics takes anonymous device location data gathered by the Cisco Mobility Services Engine (MSE), and leverages that data to provide clear, concise and relevant information. In order to make the data easier to visualize, we have recently enhanced our user interface adding many features that help users immediately and intuitively grasp the data. Our new dashboard enables every user to customize the views they wish to see and prioritize which data is meaningful to them. Our new Path engine enables customers to visualize how many people walk through the different paths in their venue. Our new reports can tell our customers everything from how many people are using their Wi-Fi to which floor people spend the most time in. These are just a few examples of the many innovations pouring into out CMX Analytics platform. Read More »
Tags: analytics, Big Data, data, enterprise mobility, healthcare, Industry, line-of-business, location, location-based, marketing, network, on-premise, on-site, online, onsite, retail, sales, social, vertical, wi-fi, wifi, wireless
On October 29-31, 2013 in Barcelona, Spain, Cisco will host customers, partners, influencers and policy-makers at the inaugural Internet of Things World Forum.
This October, Barcelona will begin the journey towards joining the ranks of Nice as a connected city, making it the perfect hotbed for displaying the Connected Mobile Experiences (CMX) solution in action. During the IoT World Forum, Cisco will showcase the CMX solution in a number of venues, both indoors and out.
CMX Analytics will be displayed on a large screen in the lobby of the iconic Hotel Arts on Barcelona’s waterfront, where the conference is being held. We will display dwell time, patterns of movement, crowding, etc. each day for the conference itself, showing real insights on the venue and attendees. Read More »
Tags: barcelona, Cisco, cmx, connected mobile experiences, internet of things, IoT, location, location based services, location services, location-based, network, services, wi-fi, wifi, wireless, World Forum