Cisco Blogs


Cisco Blog > Enterprise Networks

Impact of Bringing Your Own Devices for Work and the Network

Recently Jon Stine with Cisco IBSG wrote in the Cisco Retail blog an article titled “In Between the Numbers: Bring Your Own Device Do we know what that means?” where he talked about the changes that the BYOD concept brings to the change in the culture of employees leveraging technology to get their job done, and how it not just impacts the end point technology but all the network and information technology infrastructure.

I recently went to New York  for the National Retail Federation Conference and I took a picture of all the devices (excluding my laptop) that I carried with me for use at the hotel, in the booth, and while I was at 30,000 ft.

Cius, iPad, iPhone

As I think back about working with multiple devices (both issued to me and owned by me) during the week, here are some areas that impacted IT.

Read More »

Tags: , , , , , , , ,

Protect Mobile Devices, Protect Your Network

Reduce the risk of compromised company data by securing users’ smartphones

Once upon a time, a mobile phone was just a phone—you made and received calls on it, and that’s all. It posed zero risk to the security of your network or your business. Now, a mobile phone is so much more than just a phone. It’s a personal assistant, a portable game player, a digital camera, and most importantly, a full-fledged computer—and these smartphones definitely pose a security risk. Just like a laptop, smartphones, tablets, and other mobile devices can connect to your network, which means they could compromise your company’s data or leave your network vulnerable to attack from a hacker. You wouldn’t leave employees’ laptops unsecured, so why would you take chances with their mobile devices?

For the most part, the same security measures you ascribe to the computers on your network in the office should also be applied to mobile devices that have access to your LAN. Just like desktop PCs and laptops, all mobile devices need software protection to guard against malware and other attacks. Smartphones and tablets should have a firewall as well as antispam and antivirus software installed, such as the Cisco AnyConnect Secure Mobility Solution and Norton Smartphone Security offering.

Read More »

Tags: , , ,

Tap into the ‘Force’ to Drive Your Success in 2012

January 27, 2012 at 8:57 am PST

Have you heard the news? 3D versions of the Star Wars movies will begin rolling out in 2012. I know some sci-fi geeks…ah, friends…who can hardly wait.

Me, I prefer Force 3. I like to think of them as the living, breathing version of Star Wars. No Darth Vaders, no jittery C-3POs, but plenty of Luke Skywalkers—regular “heroes” intent on designing technology solutions with a relentless focus on meeting their customers’ business needs.

But what really grabs my attention in their video below is that Force 3 gets it, they truly do. As a thriving Cisco Master Partner, pushing products isn’t on their intergalactic radar— it’s not even within low-earth orbit.

So if it’s not selling gear, what’s Force 3’s strategy for success? Read More »

Tags: , , , ,

Cisco 4Q11 Global Threat Report

The Cisco 4Q11 Global Threat Report has been released. The report covers the period from 1 October 2011 through 31 December 2011 and features data from across Cisco Security Intelligence Operations. This quarter’s contributors were Cisco Intrusion Prevention System (IPS), Cisco IronPort, Cisco Security Research and Operations (SR&O), and Cisco ScanSafe.

Read More »

Tags: ,

2012 Predictions: These I Like

January 23, 2012 at 9:13 am PST

It took me awhile to go through all the random Top 10 of 2011 lists for various topics, so now I’m ready to look ahead to 2012’s preponderance of pundit predictions. Or maybe I’m just fashionably late. I’ve tripped over a few reports here and there – some quite possibly developed by caffeinated squirrels on a treadmill.

Not me, but she looks like she's predicting something...

On the technology front, I found one more interesting than others. Instead of putting a small group of experts in a room and not letting them out until they agree on a list, Baseline Magazine annually surveys business and technology managers at companies with 100+ employees to ask about their organizations’ investments, plans, and strategies. Across several hundred respondents, patterns evolve.

Whoever these people are, coming from the desk I use, I like the way they (and their companies) think. Following – their predictions and my two cents (maybe three or four).

Read More »

Tags: , , , , , , , ,