By Howard Baldwin, Contributing Columnist
Late in September, the International Telecommunications Union, the United Nations agency responsible for information and communication technologies (ICT), wrapped up its 11th Global Symposium for Regulators in Armenia City, Colombia. The meeting is a periodic forum designed to help national regulatory authorities exchange information about deploying broadband technology within their own countries and internationally.
The topics discussed among the more than 500 participants went beyond broadband services, however, touching upon other regulatory issues such as mobile payments and e-waste. Many of the presenters’ conclusions correlate to the conclusions reached in other Connected Life Exchange posts — that is, that for international broadband deployment to succeed, there needs to be a concerted effort on multiple fronts, including governments, service providers, vendors, and local business leaders.
Read More »
Tags: broadband, digital economy, ICT, ITU, open access, outcomes, policy, regulation
Allowing personal devices on the corporate network can make any IT professional cringe. Security is naturally a top concern – and the topic of today’s blog.
One dimension of security is about enabling network access. To do that properly, you would need to design and enforce a mobile device access policy, which may include attributes such as: what the device is, who the user is, where and when access is requested, and the health (posture) of the device. Another dimension of security is about maintaining overall device integrity regardless of the network (corporate or otherwise) it connects to.
In this video we only address the first. Cisco’s solution is based on a newly launched product, the Cisco Identity Services Engine (ISE). Watch the video to learn:
- What is the Cisco ISE?
- Can I treat corporate devices differently from personal ones?
- What about guests in the organization, do I need a separate system?
Read More »
Tags: byod, device profiling, guest access, Identity Services Engine, iPad, iphone, management, mobile devices, mobility, policy, Posture, security, Tablets, wi-fi, wifi, wireless network, wlan
Hope you found last week’s inaugural blog on the “Tablet Welcomed.” series interesting enough to come back.
Today, I am sitting down for an interview with Brett Belding, who was instrumental in designing a mobile device access policy for Cisco, in his role as the Senior Manager of IT.
I met Brett over Cisco Telepresence one early morning (when I typically I am still asleep, let alone in the office) to accommodate his Eastern time zone schedule. For the videophile readers, I should say that I pointed my camera directly to the Telepresence screen, which is why you may notice my reflection at certain points. However, this amateur video alone could be a case study for the quality of Cisco Telepresence.
Read More »
Tags: best practices, byod, iPad, iphone, mobile devices, mobility, policy, Tablets, wi-fi, wifi, wireless network, wlan
The advent of social media platforms is continually transforming the way organizations interact with customers, build brands, and engage with the world. While certain organizations have eagerly participated in social media as a means to garner long-term marketing benefits, other organizations are hesitant to address employee interaction in the new interconnected world of social media. However, simply looking the other way is no longer a viable option. The statistics are staggering and can’t be ignored: Facebook with over 500 million users, Twitter with nearly 200 million registered accounts, and LinkedIn with 100 million users.
This is a primer on how to help your organization defend itself by identifying the potential risks associated with employee use of social media, providing recommendations on how to mitigate those risks, and sharing Cisco’s approach.
Pitfalls of Social Media
Read More »
Tags: Governance, policy, privacy, social media
***Link Updated: June 2012***
In early May we published our “Cisco Social Media Policy” for our employees to read, acknowledge and if applicable inculcate into their daily regime as employees of Cisco. An internal Governance Board created this document to empower the employee’s engagement rather than harness as the employee traversed through the social media and social network landscape. Does it answer all the questions imaginable, no, it does, however, provide the necessary guidance to allow any employee to navigate and escalate any questions which may arise during the many daily social media journeys.
Many ask, what’s inside a Cisco social media policy document and why do you have one? As stated above, the guide is there to help employees navigate social networks, as the employee engages the many audiences present within these social networks.
At Cisco we are a community that embraces transparency, authenticity and openness. We encourage our employees to be a part of social networks, both internal to Cisco, as well as, external to Cisco. Our employees may use social networking sites while at work to conduct business. Cisco does not block access to social networking sites – we believe in empowering the workforce and instilling trust in our employees to work responsibly.
Read More »
Tags: Governance, policy, social media, transparency