There is no turning back from the mobile trend. With more devices comes the insatiable hunger for bandwidth. After devices are connected to the network, IT must make sure each is secured and provisioned. Creativity is needed to handle these high-density environments and enforce proper policies for mobile security, while juggling other responsibilities for the business. That complexity can be a huge headache. IT needs tools that can help make the whole process simple and fast.
Enter Cisco’s secure enterprise mobility solutions. Cisco’s 802.11ac (the latest Wi-Fi standard that enables more devices and bandwidth), Cisco Identity Services Engine (ISE), and Cisco TrustSec solutions join forces to simplify the high-density, secure mobility experience.
Join us for an engaging webcast on March 5 and learn how this combined Cisco solution can relieve your mobile device management and security headaches. Hear how Erickson Living, a trusted name in retirement communities known for innovative approaches to supporting resident needs, relied on this Cisco solution to provide high-quality, secure connectivity and a simple user experience.
Register today to learn how Erickson was able to level up to 802.11ac with heavy considerations for mobile security and how Cisco provided the tools to easily manage always-on, secure wireless access.
Get your questions answered with live Q&A. You will not want to miss this webcast. Register here.
Now when I’m talking about safekeeping a mobile device, I’m not saying don’t use your Kindle by the pool or let your toddler play on the iPad while eating ice cream. These are dangerous things to be doing with a gadget, but today I want to focus more on the data within that device, rather than the device itself.
No matter what you do, your device may be stolen. It only takes a moment of inattention for someone to swipe your phone or tablet. Before that unfortunate event occurs, there are several things that you can do to mitigate the damage that occurs from the loss of a mobile device. Read More »
What will phones in the future look like? If our experience at Cisco is any guide, there will be more and more phones, and they will look like almost anything. They will all have two things in common: they will all bring people together – and they will do it with voice and video. Always video.
The video may be on a small screen that fits in your pocket, or expands to your pad or laptop, a bigger screen that fits on the desk, or screens that cover the wall bringing people, lifesized, to your meetings from around the world.
At Cisco, we’re using all of these “phones” (although only one or two looks at all like a phone), and they all work together to bring people together, face to face. Some share more than voice and video, adding presence information and contacts and instant click to call or click to chat or click to share desktops
Here’s Rich Gore from Cisco IT, to give a quick look at these different “phones” in use at Cisco today.
The Global Certification Team is proud to announce the FIPS 140-2 Crypto certification of the 6900 and 7900 Series IP Phones.
The phones received FIPS certificate #1647 for Models 6901 and 6911 and Certificate #1650 for 6921, 6941, 6945, and 6961. Finally the 7906G, 7911G, 7931G, 7941G, 7942G, 7945G, 7961G, 7961GE, 7962G, 7965G, 7970G, 7971G, 7971GE, and 7975G were awarded FIPS certificate #1689.
Take full advantage of converged voice and data networks while retaining the convenience and user-friendliness you expect from a business phone. Cisco Unified IP Phones can help improve productivity by meeting the needs of users throughout your organization. Advanced media endpoints in this innovative suite of Cisco Unified IP Phones enhance the end-user experience.
FIPS-140 is a US and Canadian government standard that specifies security requirements for cryptographic modules. A cryptographic module is defined as “the set of hardware, software, and/or firmware that implements approved security functions (including cryptographic algorithms and key generation) and is contained within the cryptographic boundary.” The cryptographic module is what is being validated.
Labor Day has been and gone. Apparently no one can wear white now and the fish have stopped biting. Well, the first bit might be true (not sure why) but don’t tell my son Adam about the second - he’s got the fishing bug! He got it from his mum, not from me. My wife Julie enjoyed fishing with her dad when she was younger, and is converting the rest of us. Not sure I’ll ever be a true aficionado myself, but it looks like our kids will.
Anyway, the video shows Adam’s excitement at being only one of two folks to catch fish that Labor Day weekend on Mickie’s Big Mack (that’s the name of Mickey’s boat!). The boat was full of fishermen and fisherwomen and fisherstories. I don’t know much about fishing, but when it came to my turn to tell a yarn folks were surprised that I knew about “superchill” (we had been discussing the Lake Tahoe water temperature earlier, before sun-up). What is it? well… Read More »