It is no longer a question of “if” your organization will face the new reality of mobile device proliferation, just an ever closer “how soon.” Users expect the network to enable trends like Bring Your Own Device (BYOD), and they aren’t just using smartphones and tablets to be more productive, they are falling in love with them. For businesses, simply allowing access isn’t the answer. It’s a question of relevant, secure access across the entire network, while protecting corporate assets and delivering an optimal user experience. Cisco focuses on exactly that – how to enable a simple and secure mobility experience, with a consistent end-to-end architecture across wired, wireless and VPN access.
As a cornerstone of this wired-wireless access architecture, the Cisco Identity Services Engine (ISE) has already been helping customers like Whittier Union High School, San Antonio Water System and BlueWater Communications Group apply consistent security across the entire network through a centralized, single policy source.
Whittier Union High School District, a California high school district serving more than 13,600 students, was facing the challenge of mobile devices. Both faculty and students were bringing their personal devices on campus, many for educational apps and tools.
“It’s becoming increasingly critical to provide employees, students, and visitors access to our network and extensive educational resources given the growing expectations of our tech-savvy population,” stated Karen Yeh, Director of Information Technology, Whittier Union High School District.
Whittier needed a way to apply differentiated policy across their student and staff populations, somehow managing access for both personal and corporate devices, all without increasing IT resources. Karen called Cisco, and two weeks later her team was deploying the Cisco ISE, implementing a single point of security policy for their networks across wired, wireless and VPN. Considering that Richard Nixon, the 37th president of the US went to Whittier High School, the flexible network access enabled by Cisco ISE may be empowering the next generation of leaders, scientist or artists. But, mobile devices aren’t confined to education. San Antonio Water System, a public utility owned by the city of San Antonio, is seeing surprisingly similar issues.
Read More »
Tags: 802.11n, 802.1x, byod, Identity Services Engine, ISE, mobile devices, mobility, network management, policy, security, Smartphones, Tablets, vpn, wi-fi, wifi, wireless, wireless LAN, wlan
By Howard Baldwin, Contributing Columnist
Late in September, the International Telecommunications Union, the United Nations agency responsible for information and communication technologies (ICT), wrapped up its 11th Global Symposium for Regulators in Armenia City, Colombia. The meeting is a periodic forum designed to help national regulatory authorities exchange information about deploying broadband technology within their own countries and internationally.
The topics discussed among the more than 500 participants went beyond broadband services, however, touching upon other regulatory issues such as mobile payments and e-waste. Many of the presenters’ conclusions correlate to the conclusions reached in other Connected Life Exchange posts — that is, that for international broadband deployment to succeed, there needs to be a concerted effort on multiple fronts, including governments, service providers, vendors, and local business leaders.
Read More »
Tags: broadband, digital economy, ICT, ITU, open access, outcomes, policy, regulation
Allowing personal devices on the corporate network can make any IT professional cringe. Security is naturally a top concern – and the topic of today’s blog.
One dimension of security is about enabling network access. To do that properly, you would need to design and enforce a mobile device access policy, which may include attributes such as: what the device is, who the user is, where and when access is requested, and the health (posture) of the device. Another dimension of security is about maintaining overall device integrity regardless of the network (corporate or otherwise) it connects to.
In this video we only address the first. Cisco’s solution is based on a newly launched product, the Cisco Identity Services Engine (ISE). Watch the video to learn:
- What is the Cisco ISE?
- Can I treat corporate devices differently from personal ones?
- What about guests in the organization, do I need a separate system?
Read More »
Tags: byod, device profiling, guest access, Identity Services Engine, iPad, iphone, management, mobile devices, mobility, policy, Posture, security, Tablets, wi-fi, wifi, wireless network, wlan
Hope you found last week’s inaugural blog on the “Tablet Welcomed.” series interesting enough to come back.
Today, I am sitting down for an interview with Brett Belding, who was instrumental in designing a mobile device access policy for Cisco, in his role as the Senior Manager of IT.
I met Brett over Cisco Telepresence one early morning (when I typically I am still asleep, let alone in the office) to accommodate his Eastern time zone schedule. For the videophile readers, I should say that I pointed my camera directly to the Telepresence screen, which is why you may notice my reflection at certain points. However, this amateur video alone could be a case study for the quality of Cisco Telepresence.
Read More »
Tags: best practices, byod, iPad, iphone, mobile devices, mobility, policy, Tablets, wi-fi, wifi, wireless network, wlan
The advent of social media platforms is continually transforming the way organizations interact with customers, build brands, and engage with the world. While certain organizations have eagerly participated in social media as a means to garner long-term marketing benefits, other organizations are hesitant to address employee interaction in the new interconnected world of social media. However, simply looking the other way is no longer a viable option. The statistics are staggering and can’t be ignored: Facebook with over 500 million users, Twitter with nearly 200 million registered accounts, and LinkedIn with 100 million users.
This is a primer on how to help your organization defend itself by identifying the potential risks associated with employee use of social media, providing recommendations on how to mitigate those risks, and sharing Cisco’s approach.
Pitfalls of Social Media
Read More »
Tags: Governance, policy, privacy, social media