Cisco Blogs


Cisco Blog > Security

The Security Imperative As Mobility Evolves

April 1, 2014 at 6:00 am PST

Editor’s Note: This post is a response to EN Mobility Workspace. Please see that post for full context.

A colleague of mine here at Cisco, Jonathan, recently spoke well to the Evolution of Cisco Mobility Workspace Journey. Like all technologies, there is an adoption and engagement cycle based on maturity and risk level. We begin at the device-focused phase with a simple “get me on the network.” Following is the application-focused phase, “now that I am on what can I do with my ability to move around without a wire and work anytime and anywhere.” And the final is the overall experience, which is tailored to the user based on who they are, where they are, what they need or can do. And one can argue the next mobility phase for organizations is IoT (Internet of Things) as more single purpose devices (not necessarily with a user behind it) move to the wireless network.

What is critical to point out is the consistent requirement (not a nice to have) for security as the mobile user experience expands. Why is this so important? According to IDC over 47 percent of organizations see security enhancements required with their mobility initiative. The questions to consider are:

  • What are the secure mobility issues today and potentially tomorrow?
  • What are the implications?
  • What is likelihood of these threats?

The top secure mobility concerns noted by numerous surveys indicate the following:

  1. Data protection
  2. Application access
  3. Lost and stolen device
  4. Rogue devices

Read More »

Tags: , , , , , , , , , ,

Question: Are you PCI Compliant? Are you Secure? Part 1 of 2

A common perception is that there is a difference between being secure and being compliant. A Verizon analysis on cybercrime reported that cyber-attacks on Retailers are increasing and becoming streamlined and automated.  According to the 2012 Verizon PCI compliance report, “97% of breaches were avoidable through simple or intermediate controls”. How does a Retailer protect itself? One method is through PCI Compliance. Does that sound contradictory to that common perception?

Join Cisco on April 16th, 2013 10:00am PT for a webcast on PCI compliance and security with guests from Ponemon Institute, Verizon Business and PCI Security Standards Council.

As part of the planning of the webcast, we sat down with Bart McGlothin and Christian Janoff from Cisco’s security team to discuss PCI compliance and security for retail and get some answers. Here’s what we learned:

Read More »

Tags: , , , ,