Cisco Blogs


Cisco Blog > Mobility

Going Mobile? Get Secure.

There is no turning back from the mobile trend. With more devices comes the insatiable hunger for bandwidth. After devices are connected to the network, IT must make sure each is secured and provisioned. Creativity is needed to handle these high-density environments and enforce proper policies for mobile security, while juggling other responsibilities for the business. That complexity can be a huge headache. IT needs tools that can help make the whole process simple and fast.

Enter Cisco’s secure enterprise mobility solutions. Cisco’s 802.11ac (the latest Wi-Fi standard that enables more devices and bandwidth), Cisco Identity Services Engine (ISE), and Cisco TrustSec solutions join forces to simplify the high-density, secure mobility experience.

Join us for an engaging webcast on March 5 and learn how this combined Cisco solution can relieve your mobile device management and security headaches. Hear how Erickson Living, a trusted name in retirement communities known for innovative approaches to supporting resident needs, relied on this Cisco solution to provide high-quality, secure connectivity and a simple user experience.

Register today to learn how Erickson was able to level up to 802.11ac with heavy considerations for mobile security and how Cisco provided the tools to easily manage always-on, secure wireless access.

Get your questions answered with live Q&A. You will not want to miss this webcast. Register here.

Tags: , , , , , , , , , , , , , , , , , , , , , , , , ,

Thinking Outside of the Building

You’ve all heard the saying “think outside the box” when encouraging someone to be creative and come up with new ideas, new ways to do things, new ways to…..just about anything.  Well, I’d like to take a small twist on the well-known saying and talk for a moment on how deploying outdoor Wi-Fi access points should be something you should be “thinking” about.

We all know that here in late 2013 almost everywhere you go, you can pull out your laptop, tablet, or smartphone and you will find Wi-Fi coverage, be it at your workplace, at a coffee shop, or in a retail store.  Why is Wi-Fi coverage so pervasive in these areas?  Because connecting to Wi-Fi access points and the data network behind them makes employees more productive, enables the coffee shop to be the new remote office (while selling more coffee and cakes), and provides the retail store the ability to gather analytics to better target offers for their customers.

Now let’s think about expanding this coverage to outdoors….outside the buildings.  The same holds true.  Providing Wi-Fi access in the surrounding outdoor locations frees up employees to take their laptops outside and enjoy a nice, sunny day while still being “online” for secure corporate email and business tools.  It allows the employee to connect to that important WebEx meeting he is running late for as he pulls into the parking lot. It allows the retail store to engage with customers thru Cisco’s Connected Mobile Experiences (CMX) earlier and push offers to them as they walk in from the parking lot, perhaps pulling customers headed to nearby stores who might otherwise not have stopped in.

1530_pair

Aironet 1530 Series Outdoor Wireless Access Points: Click to see comparison table

Read More »

Tags: , , , , , , , , , , , , , , ,

Have You Registered for Centralize Policy, Control and Enforcement May 15th?

Activate the IT Transformation with Unified Access: Part 4 --  Centralized Policy, Control, and Enforcement 

Wednesday, May 15, 2013  10am-11am PDT     |       Register Now

Don’t miss the next in line of our five-part Unified Access Webinar Series  on May 15th to hear how organizations in education and healthcare rely on Cisco Identity Services Engine (ISE) to provide the identity enforcement and secure access control that allow employees, contractors, students, faculty, and guests (choose the user) to use their own devices on the network. Read More »

Tags: , , , , , , , , , , , , , , , , , , , , , , , ,

Compliance versus Security

Rogue access points and unauthorized access, DDoS or penetration attacks, evil twin attacks – all mobile security issues that can keep you awake at night. But do you know the difference between compliance and enterprise security? Being compliant is not synonymous with being secure, that’s why our webcast on April 16, is focused on how to bridge the gap between PCI compliance and security to minimize the impact of an attack.

Read More »

Tags: , , , , , , , , , , , , , , , , , , , ,

Access the Future of your Machine, Today

I read something the other day: today is the future’s past.

And I thought about that for a bit and decided to turn it around to machine builders. Today you deliver machines to end users that utilize your machines to make things. Tomorrow that end user will want more from that machine. How will you deliver it? Because if you don’t, you will really be in the past.

Part of the answer lies in Secure Remote Access. Part of it lies in trust between you and the end user (who by the way is your customer, if you haven’t figured that out).

Read More »

Tags: , , , , , , ,