Cisco Blogs


Cisco Blog > Collaboration

The Next-Gen Collaborator: Ready for a Mobile Workplace

Today, we’re featuring a guest post from Eric Schoch, senior director for hosted collaboration  in Cisco’s Collaboration organization. Eric is responsible for hosted and “as a service” solutions, strategic pricing and licensing, and business development.

There is simply no denying the increasing importance of being connected. Generation Y in particular, who grew up with mobile devices affixed almost permanently to their hands, views connectivity as one of life’s fundamental resources.

The newest addition to the workforce considers their mobile devices as an essential workplace tool to managing their workload and connecting with their colleagues on the go. While sitting in a meeting or having lunch in the break room, you can almost visualize the text bubbles hovering over crowds of this generation of workers as fingers hammer away at phones and tablets, eyes glued to the shiny screens in their hands. BYOD

But this trend goes far beyond lunch hours and happy hours. As proven by Chapter Two of the 2011 Cisco Connected World Technology Report, the next-generation workforce is demanding flexibility in their choice of devices in both the workplace and remote-work options, illustrating the importance of the Internet in workforce culture. Social media freedom, device flexibility, and work mobility, in the case of 30% of the study’s respondents, are more important when accepting a job than a higher salary.

Read More »

Tags: , , , , , , , , , , , , , , , , , , , , , ,

MDM Not The Only Avenue To BYOD Security

November 2, 2011 at 7:09 am PST

Okay, this may sound like gibberish. But I’m sure that many of you know what I mean. Just to be clear, let me put the title in plain English: Mobile Device Management (MDM) is not the only approach to help secure a Bring Your Own Device (BYOD) environment.

Read More »

Tags: , , , , , ,

Simplifying Compliance – Education and Solution on PCI Data Security 2.0 from Cisco

For retailers and merchants, January 1st, 2012 is the deadline after which all audits for PCI compliance need to be at the Data Security Standards 2.0.  At Cisco we have invested  in education content as well as architecture designs for PCI 2.0  to help retailers address compliance and secure credit card data.

Need to learn about the basics of PCI 2.0?  Check out the following Fundamentals of PCI  YouTube Video

For a little more deeper education about PCI including navigating the ins and outs of compliance, dig into design and implementation, and tips for a successful audit, check out the following Cisco Techwise TV episode titled “Everything You Wanted to Know About PCI But Were Afraid to Ask”

Read More »

Tags: , , , , , , , , , , , ,

Welcoming former RSA Security and VMware leader Chris Young to Cisco as our New Security Group Leader

As our customers and partners well know, security has been front-of-mind for Cisco this year. As far back as February, our CEO John Chambers announced that security was to become a top engineering priority for the company. The pace of innovation and development has been rapid ever since.

During the year, we unveiled our context-aware distributed security solution, Secure X, introduced the Cisco Identity Services Engine to simplify management of organization-wide security policies, and we brought new security to branch offices by adding Cisco ISR Cloud Web Security to the Cisco ISR G2 branch router.

We also elevated the role of our amazing Cisco Threat Operations Centers in helping customers chart the escalation and sophistication of security threats designed to exploit new business models that emphasize mobility, social collaboration and cloud computing.

Even with all of this momentum in security, we still saw opportunities to do more; to move faster; and to address our customers’ security challenges more completely.

It’s with those goals in mind, that I am delighted to announce today a senior executive appointment to further strengthen Cisco’s security business. For the first time, the security engineering team will be led by an SVP, reporting directly to me. We are pleased to share that Chris Young will be joining Cisco in on November 14th to fill this new leadership role.

Chris is an outstanding technology, business and security industry leader. He joins us from VMware, where he was Senior Vice President and General Manager, responsible for strategy, products, engineering and delivery across all of VMware’s end user computing solutions.

Prior to joining VMware, Chris served as Senior Vice President, products at RSA, the Security Division of EMC, where he was responsible for strategy, product management, product marketing, engineering and delivery of products across all of RSA’s Identity and Access Assurance, Security Information and Event Management, Governance Risk and Compliance (GRC), and Data Security solutions.

While at RSA, he built the company’s highly successful Identity Protection and Verification business, which includes products such as RSA Adaptive Authentication that today protects more than 200 million online bank accounts globally. Chris’ role grew to include responsibility for all products in the RSA portfolio and during his tenure he led several successful acquisitions, including Cyota Inc., Passmark and Archer Technologies among others.

Chris will assume responsibility for a new integrated security engineering team and for Cisco’s overall security vision. His new team combines our security technologies group and our global government security solutions into a single entity.

As we welcome Chris, we say goodbye to Tom Gillis, VP of our security technologies business unit. Tom joined Cisco through our acquisition of Ironport and has been instrumental in driving our overall security business thus far. Tom is keen to pursue his entrepreneurial passion outside Cisco. We thank Tom for his leadership and wish him well in his future endeavors.

We said during our Q2 earnings call that we would continue to take further actions that allow us to address market transitions with greater speed, agility and consistency. Today’s news is a good example of that commitment: we are evolving our operating model and investing in and strengthening our team with new talent in the process. We look forward to welcoming you to Cisco, Chris!

Tags: , , , ,

NCSAM Tip #21: Building Strong Security Policies

October 31, 2011 at 6:57 am PST

What good does a firewall, IPS sensor, encryption device, and your favorite security product and tool do if you do not have guidelines, policies, and best practices on how to effectively configure and use them? Building strong security policies is crucial for any organization. These policies should be strong, yet realistically flexible to accommodate ever-changing requirements. Read More »

Tags: , ,