Cisco Blogs


Cisco Blog > Security

Securing Your Company’s Data in a Mobile World

Mobile workers accessing corporate applications and data from a range of personal and corporate devices is fast becoming the new normal. Month by month every survey confirms the inevitable—mixing personal and business data, devices, and apps. Companies are scrambling amidst a sea of new technologies to regain control of their IT infrastructure, and those thinking ahead are planning for more than just tolerance of personal data and scaling mobile access; they’re building the next evolution of application access, which is based on consistent policies for application and data across any access method or device. These architectures demand an integrated system that spans device, network, and application layers, and they demand policies for employee access based on much more than user name and password. Read More »

Tags: , , , , , ,

Demystifying the Catalyst: Cisco Context Aware Secure Access (Security Group Tags – SGT) Technology

In this blog, let us take a look at how Catalyst access switches enable and enforce context aware access to IT resources.

Many types of devices, including laptops, smartphones, and tablets, are used by end users to connect to the network wired, wirelessly, and remotely through VPN. With bring your own device (BYOD) access, the devices can be personal or corporate owned. Every enterprise has policies that dictate who can access what applications and databases, when and how. Traditionally, IT manages the policy either by introducing appliances at points in the campus where users connect or by manually configuring all the access switches. Appliances incur additional capital and operational expenses, whereas manual configuration of the switches requires maintenance of every switch. Moreover, the network can carry traffic using Ethernet, IPv4, IPv6, or other technologies, so the configuration must keep up with changes in technology, which leads to higher operational complexity and costs.

Read More »

Tags: , , , , , , , ,

The Power of Mobility & Learning

December 11, 2012 at 11:18 am PST

The mobility trend holds great promise for improved productivity and new engagement models. These are most powerful in a learning effort—imagine learning anywhere and anytime. I just wish I had the Internet and the mobility that students have today when I went to school. Yet, mobility is an IT tsunami that will not recede. One of the most damaging aspects of this storm is the possibility of numerous personal devices that are entering organizations, accessing the network and eventually critical assets, and stealing sensitive data or mistakenly bringing malware. Many people know this policy as BYOD or bring your own device. This is not a new phrase but it is still quite prevalent. Inventory and provisioning of personal mobile devices is just the tip of this wave. Organizations want to control mobile devices to ensure acceptable usage and minimize security incidents.

Read More »

Tags: , , , ,