Cisco Blogs


Cisco Blog > Security

Consider the Best Approach for Your BYOD Mobility Environment

MDM Today and the Future

Mobile devices have quickly become a mainstay in enterprise environments and continue to be consumer driven, and yet they find their way into our day-to-day business lives. As these new devices are being brought into the work environment by employees, enterprise IT is increasingly being forced to accommodate for business use. This is not new news. We observe this pattern through our customers today and live this phenomenon within our own everyday work environment at Cisco. Here at Cisco, employees have the flexibility to choose their device and to securely connect to voice, video and data services from anywhere under an Any Device policy. Cisco manages over 64,000 mobile devices today.

Read More »

Tags: , , , , , , , , , , ,

Securing a BYOD Environment Requires Deployment Flexibility

April 4, 2013 at 9:00 am PST

When Cisco integrated our Identity Services Engine (ISE) platform with leading mobile device management (MDM) systems, it was clear from the start that we had struck a chord among IT administrators trying to wrestle with the onslaught of employee-owned mobile devices accessing their networks. First and foremost for IT organizations was gaining visibility to all mobile devices — rogue or authorized — that were present on the wireless network. Cisco ISE delivered that capability, providing IT staff with a detailed view of what types of mobile devices were on the network. Coupling that with ISE’s native BYOD enrollment capabilities or the active management capabilities of MDM platforms — as well as network intelligence from the Cisco Wireless Network — was key to gaining full control over this Wild West of mobile devices

Read More »

Tags: , , , , , , , , , , , , , ,

Cisco Sizzle – March Edition

Welcome to the Cisco Sizzle! Each month, we’re rounding up the best of the best froCisco_Sizzle_Finalm across our social media channels for your reading pleasure. From the most read blog posts to the top engaging content on Facebook or LinkedIn, catch up on things you might have missed, or on the articles you just want to see again, all in one place.

Let’s take a look back at the top content from March…

Tomorrow Starts Here
Explore how the Internet of Everything will change the way we work, live, play and learn.

Connected World Technology Report
Calling all IT professionals! Over two thirds of the IT managers agree that Big Data will be a strategic priority for their companies in 2013 and over the next five years as well. Do you agree? Is Big Data a strategic priority for your company?

Cisco on Fortune’s Most Admired
Once again, Cisco is honored to be on Fortune Magazine’s “World’s Most Admired Companies” List. Fortune tells us that the Most Admired list is the “definitive report card on corporate reputations.” Congratulations to our employees, and thanks to Fortune for the honor!

Understanding the Different Types of Wireless Routers
If your small business has grown and your workforce has become more m734216_10151813220863032_619814475_nobile, you may be considering adding wireless to your network. Cisco explains the basics so you can identify which wireless router best fits your needs.

TeleWork Week
If you telecommuted for a week, how much time do you think you would save?

Network Madness
Don’t worry network managers; we’ve got you covered. Find out about Cisco’s solutions to Network Madness.

Check out the Cisco Storify feed for even more great content!

Tags: , , , , , , , , , , , , , , , , , , , , ,

David McGrew Discusses Legacy Encryption Solutions with Mike Danseglio of 1105 Media at RSA 2013

Today, many encrypted networks use insecure cryptography. Attackers exploiting weak cryptography are nearly undetectable, and the data you think is secure is less safe every day. Legacy encryption technology can’t keep up with current advances in hacking and brute force computing power. Additionally, legacy solutions are increasingly inefficient as security levels rise, and perform poorly at high data rates. In order to stay ahead of this challenge, encryption needs to evolve.

Read More »

Tags: , , , , , , ,

Network Threats Are Hitching a Ride in Mobile Environments [Crosspost]

Protecting Your Business in an “Any to Any” World

Innovation never stops in the mobile world, and that rule applies to security threats as well. Network attacks are becoming more sophisticated and even high-tech businesses with the most advanced security may find themselves in the crosshairs as we shift to more devices and anywhere access.

Just a few weeks ago, multiple leading social networking and large enterprises were hit with an attack when their employees visited a known and trusted website focused on mobile application development. Read More »

Tags: , , , , , , ,