Cisco Blogs


Cisco Blog > Security

Why Isn’t it Easier to Customize Enterprise Mobility and Guest Portals?

Enterprises use Cisco ISE for securely granting access to visitors and on-boarding employee-owned devices over Wi-Fi.  Portals for users to gain access are becoming more advanced and the next step is for most customers to create a richer customized experience to:  

Promote your brand to guests:

  AP_blog_1  

Provide fresh information to employees:

AP_blog_2

Advertise special events, promotions and offers:

  AP_blog_3  

While, the latest Guest capabilities in ISE, including a brand new portal design tool, provide a simple way to add a customized portal in minutes, a lot of companies want more advanced customization like changing banners or adding “revolving” announcement updates on the fly. The problem is that most IT personnel are often overloaded with other projects or don’t have the expertise in advanced web design that includes knowledge of HTML, JAVA, CSS expertise to create and refresh these portals. Wouldn’t it be nice to have a way to create more professional looking and customized pages, but with a simple drag-and drop interface that bridges the gap between spending thousands of dollars in development and very basic portal building? Why hasn’t anyone come up with a way to address that middle-ground between complicated and expensive web design tools and/or contractors to go beyond simple portal building for guest access and onboarding mobile devices? Stay Tuned!

Tags: ,

Mobility, Security and the Pressure In-Between

From checking bank statements to booking flights, mobile phones have become integral to our everyday lives. In the near future, the number of mobile devices will exceed the world’s population, and by 2017, we expect more than 10 billion mobile devices to be used across the globe.

With this proliferation, public sector organizations are facing increasing pressure to accommodate the growing numbers of users expecting to be constantly connected regardless of who owns the device. The network must dynamically adjust in real-time to an exponentially growing and disparate number of devices and applications that demand immediate and secure connectivity.

In government organizations, comprehensive policies supporting BYOD initiatives are lacking. Many IT leaders still need to shift their strategies to include secure mobility within their security agenda. Read More »

Tags: , ,

The Continuum Approach for Secure Mobility

A couple weeks ago, we spoke about the mobility journey and the phases that organizations take as they embrace the widely accepted mode of mobility—Beyond BYOD to Workspace Mobility (device-focus, application-focus and experience-focus). Whatever phase your organization is in, security is a top priority. These phases can help determine your secure mobility approach but your risk aversion level will also define it. Whatever your risk tolerance, the mobile threat landscape is extremely active and clever—do not underestimate it.

The dynamic nature of mobile threats does not stop by simply entering from your mobile device but it can further propagate and manifest across the network, wired devices, virtual, cloud and data center environments. So your secure mobility approach must be non-stop, continuous and pervasive—end to end. To hinder the chance of threat damage or inappropriate access whether intentional or not, one must offer comprehensive secure mobile access controls at the access layer across each phase of an attack, before, during and after.

Read More »

Tags: , , , , , , ,

Highlights from AFCEA Homeland Security Conference: Remaining Ever-Vigilant

AFCEA Homeland SecurityLast week I had the opportunity to attend the AFCEA Homeland Security conference in Washington, D.C.

Eleven days after the September 11, 2001, terrorist attacks, the first Director of the Office of Homeland Security was appointed leading to the combination of 22 different federal departments and agencies into a unified, integrated cabinet agency when it was established in 2002.

The Department has a vital mission to secure the U.S. from many threats with capabilities that range from aviation and border security to emergency response, from cybersecurity to chemical facility inspections.

The three day conference focused on a number of important topics including:

  • Mobility and Interoperability
  • Information Sharing and Fusion Centers
  • Big Data Analytics
  • Role of Laboratories and Scientific Research in Homeland Security
  • Cybersecurity Education and Continuous Diagnostics and Monitoring

Read More »

Tags: , , , , , , ,

User Behavior and Training Critical to Secure Mobility

Worker mobility has become an essential practice for government agencies. From teleworking on the road to accessing critical data on your smart phone, mobility increases productivity and employee satisfaction. And the trend toward mobility is growing. In fact, the Cisco Visual Networking Index predicts there will be more than 10 billion mobile devices worldwide by 2017. With the increased proliferation of mobile devices comes the need to ensure that appropriate policies and procedures are in place so agencies can take advantage of increased capabilities while still maintaining high levels of security.

By and large, government agencies are doing a good job of balancing the need for mobility with security requirements. However, according to a new study by Mobile Work Exchange, which was commissioned by Cisco, 41 percent of government employees are putting agencies at risk with secure mobility habits. Clearly, there is some room for improvement. MWEhotzone

The study used the Secure Mobilometer, an online self-assessment tool, to capture data from end-users and agencies. The tool ranked their mobility habits based on practices of user inputs, password protection, data loss prevention, mobile device policies and security training.

Read More »

Tags: , , , , ,