Cisco Blogs


Cisco Blog > Mobility

Cisco Meraki Systems Manager Extends Enterprise Mobility Management to the Cloud

The industry is going beyond BYOD—it’s not just about simply connecting the device anymore: the mobile landscape has grown to include apps, devices and content, all of which require security and management. This is no easy task. Enterprise mobility management (EMM) is no longer a nice-to-have for our customers—it is a necessity. You need a mobile strategy.

We at Cisco have been steadily building out our mobility portfolio across infrastructure, policy and management over the past few years to provide our customers with what they need to get ahead of the mobile trend.

It has always been Cisco’s strategy to use open API’s with ISE to integrate with host of 3rd party EMM vendors, including Citrix, MobileIron, Airwatch and many more. We are now extending that flexibility to create a cloud-managed EMM offering with our Cisco Meraki solution.  The latest addition to the Cisco mobility portfolio, the Cisco Meraki Systems Manager Enterprise is an evolution of Cisco Meraki’s existing MDM cloud offer, and a natural extension of the Cisco Meraki network management solution (e.g. extending management of wireless access points to the management of devices connecting to the enterprise domain).

Cisco is committed to customer choice, and will continue to offer different options to the market, including ecosystem EMM partner solutions. The addition of the Cisco Meraki Systems Manager broadens that portfolio to strengthen our offering and empower our customers attain the mobility solution best suited for their specific requirements.

For more information on the Cisco Meraki Systems Manager, read the full announcement blog here.

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

Looking Forward to Cisco’s Internal Security Conference: SecCon 2014

September 25, 2014 at 10:15 am PST

Cisco’s internal security conference (SecCon) is just around the corner and this year marks our seventh anniversary!

In previous years SecCon participants heard from a renowned privacy specialist, a Chief Security Officer from a large customer, a cyber security coordinator for two U.S. Presidents, and a self-described gentleman thief. This year we are delighted to welcome another lineup of top-notch industry-leading speakers, including:

  • Alex Stamos, Chief Information Security Officer (CISO), Yahoo
  • Dave Kennedy, Chief Executive Officer (CEO), TrustedSec
  • Mano Paul, CEO, SecuRisk Solutions
  • Josh Corman, Chief Technology Officer for Sonatype
  • Adam Shostack, Microsoft’s Trustworthy Computing Usable Security Team
  • James Wickett, DevOps and InfoSec expert from Signal Sciences Corp
  • John Stewart, CSO, Cisco

The security community and talent at Cisco is growing at a very fast pace. SecCon has brought together hundreds of engineers, live and virtually, from Cisco offices around the globe with one common goal: to share their knowledge and increase the overall security posture of Cisco products.

Read More »

Tags: ,

Another Major Vulnerability Bashes Systems

Vulnerabilities that permit remote network attacks against ubiquitous software components are the nightmares of security professionals. On 24 September the presence of a new vulnerability, CVE-2014-6271 in Bash shell allowing remote code execution was disclosed.
Read More »

Tags: , , , , , ,

New CSA Survey Highlights Opportunities for Data Privacy Harmonization Across Cloud, IoT and Big Data

Responses in a recent Cisco-sponsored Cloud Security Alliance survey (hyperlink) illustrate that many data privacy challenges previously cast in the  “too hard” basket can be more readily navigated though focusing on universal principles across Cloud, IoT and Big Data.  Survey responses showed a surprisingly strong level of interest in a global consumer bill of rights and responses were overwhelming in favor of the OECD data privacy principles facilitating the trends of Cloud, IoT and Big Data.

Following are the most significant findings:

Data Residency and Sovereignty

Data residency and sovereignty challenges continue to emerge.  However, there was a common theme of respondents identifying “personal data” and Personally Identifiable Information (PII) as the data that is required to remain resident in most countries.

User Consent

73 percent of respondents indicated that there should be a call for a global consumer bill of rights and saw the United Nations as fostering that.  This is of great significance with the harmonization efforts taking place in Europe with a single EU data Privacy Directive to represent 28 European member states. As well as with the renewed calls for a U.S. Consumer Bill of Privacy Rights in the United States and cross-border privacy arrangements in Australia and Asia.

Privacy Principles

Finally we explored whether OECD privacy principles that have been very influential in the development of many data privacy regulations also facilitate popular trends in cloud, IoT and big data initiatives or cause room for tension.  The responses were very much in favor of facilitating the various trends.

The survey report includes an executive summary from Dr. Ann Cavoukian, Former Information and Privacy Commissioner of Ontario, Canada and commentary from other industry experts on the positive role that privacy can play in developing new and innovative cloud, IoT and Big Data Solutions. Read the Data Protection Heat Index survey report:

Data Protection Heat Index Survey Report – Sep 2014 from Cisco Data Center

 

Tags: , , , , , ,

Cisco Security Leadership Transition

I would like to announce that David Goeckeler is assuming leadership responsibilities for Cisco’s Security Business Group (SBG) effective immediately.  David has served as vice president of Product and Platform Engineering for the SBG for the last two years. His expertise will continue to help drive Cisco’s security momentum and ensure we are our customers’ number one security partner.

David has been with Cisco for 14 years. Most recently, he and his team have been instrumental in developing Cisco’s end-to-end security architecture, integrating market-leading products from recent acquisitions including Sourcefire into Cisco security solutions. These efforts are enabling Cisco to address customers’ needs in a way that no other vendor can match today.

David played a key role in last week’s launch of the Cisco ASA with FirePOWER Services next-generation firewall (NGFW). His efforts also directly contributed to a report issued today by NSS Labs that shows Cisco as a leader in security effectiveness in its 2014 NGFW Security Value Map (SVM).

David maintains a deep bench of security expertise including Marty Roesch, Bret Hartman, Mike Fuhrman, Scott Harrell and Marc Solomon. David has received a M.S. in Computer Science from the University of Illinois at Urbana -- Champaign, and MBAs from Columbia University and the University of California -- Berkeley.

I would also like to share with you that Christopher Young has decided to leave Cisco. We would like to thank Chris for his leadership and guiding Cisco through significant transitions. Under David’s new leadership, we look forward to continuing to provide best in class security solutions to our customers.

Tags: , , , ,