Cisco Blogs


Cisco Blog > Mobility

Three Simple Ways to Boost Mobile Device Security

The explosion in business mobility is transforming our companies in profound—and sometimes challenging—ways. One of the most vexing issues is security.

Recently, I came across a Wharton article predicting that by 2015, more Americans will access the Internet through mobile devices than PCs. From open data to an increase in government-accessed information, this sweeping trend raises questions about the true security of mobile networks and devices. But how can an organization support the infusion of wireless devices into employees’ lives without opening the door to heightened security risks? Read More »

Tags: , , , , , , , , , , , ,

[Cartoon Catalyst Blog Series] K-12 BYOD. Secure Students, Determine Internet Access, and Yet Provide Awesome Network Performance?

So many students, so many devices, yet zero increase in number of IT staffers. The increasingly unbalanced ratio is enough to cause a few nightmares for any IT professional.  Luckily, supporting student IT requirements, while remaining secure, has become a bit simpler with Identity Service Engine (ISE)  Policy Deployment, part of Cisco BYOD Solutions for K12 Education.   With ISE, IT staffers can quickly add and support student’s devices like laptops, smart phones and tablets and at the same time ensure the protection of student information access, dynamically control who gets access to what and provide optimal network user experience.  You can be rest assured that we have your back while you balance it all.

K-12 TightRope1    

Protection of Minors – Let’s face it – K-12 means we’re talking about minors, so we need to tread quite carefully. Extending network access across wired and wireless opens education to a world of innovation; yet it also opens the network up to security threats. 64% of parents feel it is a schools responsibility to effectively teach students how to use their mobile devices safely [Info graphic].  Protection of access to and access by students is a high-priority.  It is critical to restrict access to confidential student records while making sure students get the right access to resources they need for learning. The ISE component of the  K12 BYOD Solution protects student information through secure,   role-based, application access – simply – over the wired and wireless infrastructure. Read More »

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

Cisco Hacks: Notes from the CMX Hackathon

Editor’s Note: This is a guest post by two Wireless Networking Group interns, Nonie Grewal and Nivedita Jagdale, to capture their thoughts on the Connected Mobile Experiences Hackathon that they helped plan and execute.

June 29th marked the start of the Connected Mobile Experiences (CMX) Hackathon in the Cisco San Jose campus. CMX, powered by the Mobility Services Engine, provides a unique way of providing personalized real time location services over Wi-Fi. CMX aims to increase customer-oriented and operational efficiencies through analytics and personalized mobile services. The contestants at the hackathon were invited to help build prototypes that could help complement these goals, focusing on enhancing user connectivity and visibility.

cmxhack1

As summer college interns volunteering at the event, we walked into the Deep Space Nine room where the hackathon was held, to find clusters of intense developers at each table. With each passing minute, we felt the name “Deep Space” seemed apt for the cause it was hosting – deep thought and real coding! Read More »

Tags: , , , , , , , , , , , , ,

802.11ac in the Healthcare Industry

Live Webinar on 802.11ac in Healthcare July 16, 10am | Register Now

3600_module

With any new wireless technology, much of what is initially written in the first year is usually focused around the bits and bytes and the speeds and feeds of the technology. This is true for 802.11ac where any Google search will yield a plethora of articles on the potential of Gigabit wireless or that it runs on the 5GHz band and could have up to 8 spatial streams. However, the conversations must start moving towards discussing how the technology can be used in practical situations. In the case of our 802.11ac Module for the 3600, we feel very strongly that it is necessary to not only talk about the speeds and feeds of  802.11ac, but also show how a customer plans to use 802.11ac.

That’s why at our popular presentation at Cisco Live! Orlando, we first discussed the 802.11ac Standard, Cisco’s 802.11ac solution and how it can be used in various networks, and then invited representatives from Methodist Hospital in Houston, TX to discuss their experience to date with 802.11ac. Read More »

Tags: , , , , , , , , , , , , , , ,

Keeping It Simple

The last thing people in the collaboration space want is yet another technology, which is why one of my top priorities is simplification.

Think about it.  Do you want more stuff coming at you every day?  I’m guessing the answer is no.  What you want is for somebody to bring all the collaboration tools together, so that they work better.  Simplification goes hand in hand with another of my priorities and that’s user experience.  People don’t want to have to pore over manuals, they just want  devices and services that are easy to use.

The good news is that Cisco is already a leader in user experience and will only get stronger.

Tags: , , , , ,