As a business or technical leader, you know you need to protect your company in a rapidly evolving mobile ecosystem. However, threats are not always obvious. As malware and attacks become more sophisticated over time, business decision makers must work with technical decision makers to navigate security threats in a mobile world.
This blog series, authored by Kathy Trahan, explores the topic of enterprise mobility security from a situational level and provides insight into what leaders can do now to mitigate risk. To read the first post focused on securing device freedom, click here. The second post, available here, focused on the risks that come with mobile connections. Kathy’s third post explored how to secure mobile data. – Bret Hartman, Chief Technology Officer (CTO) for Cisco’s Security Technology Group
In today’s mobile and cloud-centric landscape, the ability for employees to access data, account information, real-time statistics, and other pertinent information on their personal devices is what it takes to remain competitive in the business marketplace.
And while the rush has been on to empower employees to be able to connect from anywhere, security concerns are topping the “must address” list of enterprises everywhere.
One key concern is the increasing use of mobile devices to access relevant business information. In fact, according to the Cisco Connected World International Mobile Security survey, 63% of users downloaded sensitive data on such devices.
So, in a scenario where a team of sales representatives are updating account profiles by accessing data on their personal devices, IT and business leaders must ask: How secure is the network the team is using to access sensitive company information? Is it possible malware on their mobile devices can gain entry from a public or private cloud to compromise or steal data? Should mobile security policies prohibit certain employees from downloading certain information when they are off-site?
These questions must be answered. Especially since over the next four years, there will be nearly 21 billion networked devices and connections globally. Business Decision Makers (BDMs) and Technical Decision Makers (TDMs), must team up and determine the best mobile security policies that balance productivity and security of sensitive data, notably understanding security threats and establishing access requirements.
Read More »
Tags: Cisco, Cisco Mobility, future of mobility, mobile, mobile device, mobile security, mobile workspace, mobility, network, security
If you are a professional photographer or even an amateur like me, you want to have ready access to various control dials on your camera to capture the moment perfectly. Professional cameras provide high level of control to get the best outcome. But there are times when you want to put the camera and the lens in Auto mode or wish that the camera could automate some decisions that make your workflow easier.
Likewise, Cisco Wireless LAN products provides the level of quality, functionality and control that is unmatched and hands-down the best enterprise wireless networking portfolio in the industry. But there are scenarios where it is preferable to expedite wireless configuration with best practices automatically enabled and easy access to data to simplify monitoring and troubleshooting workflow. For example, a small business owner manages his own network or in a K-12 a librarian acting like a part-time IT administrator. This not only provides operational efficiencies for the IT organization but also improves end-user and partner experience.
Cisco WLAN Express Setup is an attempt in this direction. It is now available on 2500 Series Controller (CT2504) starting with software release 184.108.40.206.
It includes three components
- Easy-to-use setup wizard: This eliminates the need for console cable and command line setup. Instead, 3-step web-wizard is used to quickly boot strap a Controller and configure employee and Guest WLAN out of the box.
Read More »
Tags: 11ac, 802.11ac, access point, aireOS, analytics, App, application, AVC, best-in-class, Bonjour, cellular, chromecast, Cisco, cmx, configuration, connection, control, controller, data, device, Express, LAN, mag on ap, mobile, mobility, network, networking, optimized roaming, policies, protocol, release, rx-sop, setup, software, Speed, technology, traffic, users, visibility, VLAN, vni, wi-fi, wifi, wired, wireless, wlan, WLC
Cisco Wireless Release 8.0 is now available: Product Bulletin
The Cisco VNI Global Mobile Data Traffic Forecast, 2013 – 2018 revealed some stunning trends with growth projections that are sure to have a dramatic impact on wireless networks worldwide.
In 2013, globally, there were nearly 22 million wearable devices generating 1.7 petabytes of monthly traffic. There were about 7 billion mobile-ready devices and connections with mobile network connection speeds that have more than doubled, to 1.4Mbps up from 526 Kbps in 2012.
By 2018, there will be more than 10 billion mobile-ready devices and connections. The average mobile connection speed will nearly double, from 1.4 Mbps in 2013 to 2.5 Mbps and over 4.9 billion devices will be IPv6-capable. There will be more traffic offloaded from cellular networks (on to Wi-Fi) than remain on cellular networks.
Read More »
Tags: 11ac, 802.11ac, access point, aireOS, analytics, App, application, AVC, Bonjour, cellular, chromecast, Cisco, cmx, connection, control, controller, data, device, fastlocate, HDX, IPv6, LAN, lbs, location, mag on ap, mbps, mobile, mobility, multicast, network, networking, optimized roaming, Packet, patterns, pmipv6, policies, Presence, protocol, q-in-q, q-in-q tagging, release, rx-sop, software, Speed, technology, traffic, users, visibility, VLAN, vni, wi-fi, wifi, wired, wireless, wlan, WLC
Location-based services have been getting a lot of attention lately and people are increasingly curious about how Wi-Fi and beacons play together in the hot space that is indoor location technology. In my last blog I reviewed how beacons work and how to differentiate when to use Wi-Fi and beacons. There’ve been some great questions about beacon technology and how it complements Cisco’s location-based Connected Mobile Experiences (CMX) solution, so I want to follow up on these topics with everyone.
What types of beacons are there?
Generally, there are two different classes of beacons: transmit only and backhaul enabled.
Transmit only beacons are exactly as they sound – they simply transmit information to anyone that is capable of hearing (bluetooth enabled smartphones). They do not receive or pass any data or information upstream.
Apple’s iBeacon is the best example of this type of BLE beacon. You can think of them like the navigational beacons used by airplanes when on approach to major airports. The beacon doesn’t even know the plane is there, but the plane is aware of the beacon and knows where the beacon is allowing it to take the correct action. Same is true for smartphones and transmit only beacons like iBeacon – the intelligence is located in the mobile application which must recognize the beacon and take appropriate action.
Backhaul enabled beacons generally include a Wi-Fi chipset for either management or data capabilities. Some backhaul enabled beacons are USB enabled and take advantage of whatever connectivity exists within the PC they are connected. Read More »
Tags: access, analytics, Apple, beacon, BLE, bluetooth, byod, Cisco, cmx, consumer, customer, deployment, device, dimension, Enterprise, GPS, granular, Guest, healthcare, ibeacon, indoor, Indoor location, IT, lbs, line-of-business, location, location based services, marketing, mobility, mse, network, operation, productive, productivity, proximity, retail, sales, tag, technology, track, tracking, wi-fi, wifi, wireless, wlan
Tomorrow’s a special #WirelessWednesday, hats off to the folks working hard at Tech Field Day for kicking off the SEVENTH installment of Wireless Field Day. It’s an exciting time for the industry to give the delegates and the world wide web of Wi-Fi enthusiasts a glimpse behind the scenes of some of the latest technologies, and we are ready to put on a show.
This year, Cisco will host Wireless Field Day 7 delegates at the Cisco Meraki San Francisco office this Friday.
We will be spending 2 hours discussing the forefront of Wireless technology with Cisco thought leaders. Here is a sneak peek of what will be covered.
- Latest updates on the Cisco Meraki MR product line.
- Deep dive into the Cisco Meraki traffic analytics algorithm; how it works and how it scales for large deployments.
- Deep dives into MU-MIMO and RX-SOP; what they are and how they work
- Discussion on 802.11ac and where it’s going.
The show will start at 9:30am PST. We’ll be on Twitter with #WFD7 and streamed live on the TechFieldDay website. Tune in Friday to hear updates on the future of wireless networking.
Tags: #80211ac, #WFD7, #wirelesswednesday, airtight, aruba, avaya, Cisco, Extreme, Fluke, Industry, meraki, network, networking, tech field day, techfieldday, technology, wi-fi, wifi, wild packets, wildpackets, wireless