Cisco Blogs


Cisco Blog > Mobility

Tablets Welcomed: How Cisco IT created a mobile access policy for any device

Hope you found last week’s inaugural blog on the “Tablet Welcomed.” series interesting enough to come back.

Today, I am sitting down for an interview with Brett Belding, who was instrumental in designing a mobile device access policy for Cisco, in his role as the Senior Manager of IT.

I met Brett over Cisco Telepresence one early morning (when I typically I am still asleep, let alone in the office) to accommodate his Eastern time zone schedule. For the videophile readers, I should say that I pointed my camera directly to the Telepresence screen, which is why you may notice my reflection at certain points. However, this amateur video alone could be a case study for the quality of Cisco Telepresence.

Read More »

Tags: , , , , , , , , , , ,

5 Tips to Avoid the Pitfalls of Social Media

The advent of social media platforms is continually transforming the way organizations interact with customers, build brands, and engage with the world.  While certain organizations have eagerly participated in social media as a means to garner long-term marketing benefits, other organizations are hesitant to address employee interaction in the new interconnected world of social media.  However, simply looking the other way is no longer a viable option.  The statistics are staggering and can’t be ignored:  Facebook with over 500 million users, Twitter with nearly 200 million registered accounts, and LinkedIn with 100 million users.

This is a primer on how to help your organization defend itself by identifying the potential risks associated with employee use of social media, providing recommendations on how to mitigate those risks, and sharing Cisco’s approach.

Pitfalls of Social Media

Read More »

Tags: , , ,

Social Media – The Efficacy of the Corporate Guide

***Link Updated: June 2012***

In early May we published our “Cisco Social Media Policy for our employees to read, acknowledge and if applicable inculcate into their daily regime as employees of Cisco.  An internal Governance Board created this document to empower the employee’s engagement rather than harness as the employee traversed through the social media and social network landscape.  Does it answer all the questions imaginable, no, it does, however, provide the necessary guidance to allow any employee to navigate and escalate any questions which may arise during the many daily social media journeys.

Many ask, what’s inside a Cisco social media policy document and why do you have one?  As stated above, the guide is there to help employees navigate social networks, as the employee engages the many audiences present within these social networks.

At Cisco we are a community that embraces transparency, authenticity and openness.  We encourage our employees to be a part of social networks, both internal to Cisco, as well as, external to Cisco.  Our employees may use social networking sites while at work to conduct business.  Cisco does not block access to social networking sites – we believe in empowering the workforce and instilling trust in our employees to work responsibly.

Read More »

Tags: , , ,

Live Interop Session: Customer Case Study, Take Control of Mobile Devices on Your Network

Tablets and mobile devices are driving massive change in the IT world. We are seeing a few key shifts that need to be addressed:

The user to device ratio has changed, while IT resources stay the same:

  • Early 1990s: Each user has one device on a wired connection.
  • Late 1990s: Users have gone mobile with laptops and other local devices.
  • Today: Employees require anytime, anywhere access with multiple devices per person.

IT is struggling to secure, manage and support employee-owned devices in the workplace, bringing it’s own set of challenges:

  • Classifying managed vs. unmanaged endpoints.
  • Ensuring proper identification and authentication of devices.
  • Associate each user with the proper host.

It all comes down to this: when your employee brings an iPad into work, how can you centralize access and policy management, without adding IT resources?

Join our session to learn how the Cisco Identity Services Engine and Cisco Prime Network Control System offer the solution. Timothy Abbott, Senior Network Engineer, CCNA, CCNP will be on-site to present a case study from his experience at the San Antonio Water System.

We hope to see you Wednesday May 11th, 11:15am -- 12:00pm in the Mandalay Bay L conference room. Learn more.

Tags: , , , , , , , ,

The Gap Between Policy and Implementation

Mark Twain once wrote, “Everybody complains about the weather, but nobody ever does anything about it.” Security policy is a lot like that. Creating a security policy is at the top of the list for anyone looking to really secure their network. But the devil is in the details.

Among the things a security policy needs to cover are:

  • All users
  • All physical and virtual devices
  • All access methods
  • All resource classifications and locations
  • All compliance requirements
  • All of the OSI layers, from the physical layer up the stack to the application layer
  • AND the policy needs to be applied uniformly across the entire distributed enterprise

Read More »

Tags: , , , , ,