Cisco Blogs


Cisco Blog > Mobility

Partnering with Apple on BYOD and Great User Experience

Mobility extends beyond devices. Yet, having the right devices and choice of devices allows us to work the way we’d like. In fact, Cisco is one of the world’s largest enterprise users of Apple products. Employees have purchased 33,000 iPhones and 16,000 iPads as part of Cisco’s BYOD program, and almost half of our regular employees are using Macs.

Recently Cisco’s Sheila Jordan, Senior Vice President of Communication and Collaboration IT spoke with Apple about BYOD, as part of Apple’s Tech Talk series. Here she and Brett Belding, Senior Manager, Cisco IT, discussed what’s behind Apple’s popularity at Cisco. They also address what enterprises like Cisco can emulate  what Apple has created for consumers in terms of user experience and bring that into today’s mobile enterprise.

Check out Sheila’s blog “Partnering with Apple on BYOD and Great User Experience” where she discusses the Apple Tech Talk and Cisco’s mobile and collaboration strategy.

Tags: , , , , , , , ,

Enterprise Apps: The Next Wave in Mobile Transactions

Earlier this year, I was having a business dinner with an important client in London when I received an IM on my iPhone. The message was from a Cisco colleague, and it said, “I need you to approve a purchase order. Right now.”

So I stepped away from the table, launched an app on my iPhone, read the purchase order, and clicked “approve.” Then I returned to my seat and went back to our dinner without missing a beat. The whole process took maybe two minutes.

Just a few years ago, this transaction would have required a laptop tethered to the network in a hotel or office, and it would have completely disrupted the dinner.  This pace of change, leveraging mobility solutions, across IT is unprecedented.

Why are so many businesses turning to mobile enterprise apps? According to Gartner, more than 25 percent of enterprises will have an app store by 2017. Mobile apps are making the promise of BYOD a reality. People love their apps and the highly personalized experience they deliver. By bringing their own devices to work, people can enjoy their work more, use the devices they choose, and do their jobs better and faster—from anywhere. According to Cisco’s latest study, the Financial Impact of BYOD, they can also be more innovative and productive.  At Cisco we firmly believe that work is a thing you do, not a place you go.  Read More »

Tags: , , , , , , , ,

Summary: BYOD and Collaboration Don’t Have to be Next National Security Threat

In a world where people are always on the go, it’s only natural that employees will use their own mobile platforms more often for collaboration.  However, the increase in the Bring Your Own Device (BYOD) trend for collaboration purposes brings about a number of security concerns in the workplace.

There are multiple capabilities that go into delivering an enterprise-class BYOD solution. The recent attention around the National Security Agency (NSA) surveillance leak may have organizations across the globe reevaluating their strategies when it comes to BYOD security, but there are tools to minimize threats, such as: user authentication, network access control, and remote data wipe

We understand the need for an emphasis on security and have developed the tools to minimize the threat when it comes to your organizations’ BYOD strategy. Please take a look at our CTO of Collaboration, Laurent Philonenko’s recent No Jitter article about the many options and factors to consider when planning your BYOD security strategy.

Tags: , , , ,

Summary: BYOD and Collaboration Don’t Have to be Next National Security Threat

In a world where people are always on the go, it’s only natural that employees will use their own mobile platforms more often for collaboration.  However, the increase in the Bring Your Own Device (BYOD) trend for collaboration purposes brings about a number of security concerns in the workplace.

There are multiple capabilities that go into delivering an enterprise-class BYOD solution. The recent attention around the National Security Agency (NSA) surveillance leak may have organizations across the globe reevaluating their strategies when it comes to BYOD security, but there are tools to minimize threats, such as: user authentication, network access control, and remote data wipe

We understand the need for an emphasis on security and have developed the tools to minimize the threat when it comes to your organizations’ BYOD strategy. Please take a look at our CTO of Collaboration, Laurent Philonenko’s recent No Jitter article about the many options and factors to consider when planning your BYOD security strategy.

Tags: , , , ,

TMA? Get Some Relief from Acronym Overload

I see and hear a variety of acronyms being used on a daily basis. I recently heard one tossed around with good humor that makes a point: TMA or Too Many Acronyms. Every once in a while, when I think I’ve embedded the definition and use of an acronym into my long-term memory (anything beyond an extended weekend), it seems as if either a new acronym was spawned, or it has been overloaded with a different meaning. My goal in this blog post is offer both a refresher on some topical acronyms that appear to be quite commonly circulated in security technology circles and media outlets. It is challenging to be a subject matter expert in every aspect of cyber security. Whether you are reading an article, joining a conversation or preparing for a presentation or certification in the realm of cyber security, you may not be completely perplexed by these acronyms when you come across them and become more familiar with them. For situational purposes, I organized the acronyms into categories where I have seen them used frequently and included related links for each of them.

Network Infrastructure

AAAAuthentication, Authorization, and Accounting. This is a set of actions that enable you to control over who is allowed access to the network, what services they are allowed to use once they have access, and track the services and network resources being accessed.

ACL/tACL/iACL/VACL/PACLAccess Control List. ACLs are used to filter traffic based upon a set of rules that you define. For ACLs listed with a prefix (for example, t=transit, i=infrastructure, V=VLAN (Virtual Local Area Network), P=Port)), these ACLs have special purposes to address a particular need within the network.

FW/NGFW/FWSM/ASASM: Firewall/Next Generation Firewall/Firewall Service Module/Adaptive Security Appliance Services Module. These products provide a set of security features designed to govern the communications via the network. Cisco provides firewall features as a dedicated appliance or hardware module that can be added to a network device such as a router.

IPS: Intrusion Prevention System. Typically, this is a network appliance that is used to examine network traffic for the purposes of protecting against targeted attacks, malware, and application and operating system vulnerabilities. In order to ensure the effectiveness of a Cisco IPS device, it  should be maintained using Cisco’s IPS subscription service.

DNSSECDomain Name System (DNS) Security Extensions. That’s right, we have an acronym within an acronym. These are the specifications for security characteristics that make it possible to verify the authenticity of information stored in DNS. This validation makes it possible to provide assurances to resolvers that when they request a particular piece of information from the DNS, that they receive the correct information published by the authoritative source. Read More »

Tags: , , , , , , , , ,