It’s a router. No, it’s a firewall. No, it’s unified threat management. It’s … the new Cisco ISA500.
We hear a lot lately about how many mobile devices are connecting to the internet. And, with today’s BYOD (Bring Your Own Device) trend, more employees are wanting to use their preferred devices. They’re also wanting flexibility with where they work. We’re in a new work world, where mobility is the name of the game, and security is the game controller that determines who will have the advantage. Enter: The new Cisco ISA500.
As a recent infographic from research and industry analyst firm Techaisle shows, 61 percent of SMBs in North America allow BYOD; and 53 percent expect productivity improvement. But for those two things to happen together successfully, there needs to be strong security in place. This becomes especially important given that we’re seeing an uptick in the number of SMBs targeted for cyberattacks and the number of employees engaging in risky behavior when accessing the web.
So when Cisco looks at these challenges, we focus on three key things: safeguarding outside threats that can bring down the network, the ability for employees to securely access information, and a simple way to manage it all. The Cisco ISA500 helps customers do exactly that, by acting as a highly sophisticated router, firewall, and unified threat management in one device. Not only did it win “Outstanding Hardware Solution” at IT Nation, it’s also getting a lot of praise from our partners.
We sat down with David Lawrence, president of Smart Technology Enablers, who talked about his views of this offering. Take a look at what he had to say.
If you’d like to learn more about Cisco small business products, please visit www.cisco.com/go/smb. And to learn more about responsive, proactive support options that Cisco Services offers to help keep your small business network running smoothly, click here.
At Cisco Live London, one of my data center theater presentations will focus on the benefits of a context-aware and adaptive security strategy. This approach helps accelerate the adoption of virtualization and cloud, which traditional static security models often inhibit. Context-based approaches factor in identity, application, location, device, and time along additional security intelligence such as real-time global threat feeds for more accurate security access decisions.
Neil MacDonald, vice president, distinguished analyst, and Gartner Fellow in Gartner Research has been advocating the benefits of a context-based approach now for some years as outlined in his Gartner blog. Not only does he say that by 2015, 90 percent of enterprise security solutions will be context-aware but in cloud computing environments where IT increasingly doesn’t own key IT stack elements, having additional context at the point of security decision leads to better decisions with risk prioritization and business factors accounted for. Neil MacDonald also co-authored a report, “Emerging Technology Analysis: Cloud-based Reputation Services,” which highlights the value of cloud-based threat intelligence in enabling secure cloud adoption.
A key trait of innovative small and medium sized businesses (SMBs) is agility– making decisions quickly, shifting direction with a customer, and swiftly working out the details with colleagues. But at the end of the day, what it all comes down to is having the right technology—to enable responsiveness, increase overall productivity, and keep SMBs competitive.
And that becomes especially important when you look at statistics around mobility. The mobile worker population is expected to reach 1.3 billion by 2015, and 71 percent of SMBs now functioning as work-from-anywhere businesses (according to IDC’s Worldwide Mobile Worker Population 2011–2015 Forecast. At the same time, this move to mobile has refocused SMBs’ attention on security.
On-the-go SMB workforces need to be able to work and collaborate securely, whether onsite or mobile. And, since SMBs generally don’t have dedicated IT departments, they need technologies that are easy to use and manage, all while fitting within a tight budget. This kind of enablement is what allows small businesses to be agile.
In response to these challenges, Cisco has introduced a host of new small business technologies designed to support the requirements of nimble SMBs that are looking to get an edge. These offerings deliver new capabilities around security, collaboration, and mobility.
Cisco SPA500DS Expansion Module: A digital attendant console that attaches to the SPA500 Series IP Phones, further enhancing Cisco’s collaboration products.
Cisco RV215W Wireless-N VPN Router with 3G/4G: Easy-to-use wireless router packs in security features and enables seamless mobile connectivity with a wide variety of options including 3G and 4G via a USB data card. This allows connectivity when wired access isn’t available.
To learn more about our latest small business products, visit our website. And, watch for additional blogs in the coming days that will zero in on related topics to provide more context around how you can help maximize productivity in a secure environment, however you define your workspace.
We’d also love to hear from you about your SMB challenges. What are you hoping to tackle this year from an IT perspective?
It’s only been a few days since we said goodbye to 2012 and we are already seeing what many predicted for 2013: an increase in the creation, enhancement, and usage of numerous exploit kits by cyber criminals. Cyber criminals don’t take long vacations in December. On the contrary, they “work hard” and make lots of money during the holiday season! These criminals are continuously improving their tools to keep up with us (the good guys) and continue enhancing their “money-making machines.” A real-life example is how cyber criminals were able to quickly incorporate the exploits of the recently found Java vulnerability that I described in a post a few days ago.
Exploit kits make it easy for these criminals because they can easily spread malicious software that exploits well-known and new vulnerabilities. New exploit kits are loaded with some of the most dangerous zero-day exploits and other features that allow criminals to increase their profits.
These days, the generation of data has become almost as constant as breathing. With every click or swipe, today’s mobile, hyperconnected consumers exhale an ever-expanding trail of digital details, revealing troves of information about their wants, needs, interests, well-being, and aspirations.
All of that data offers great promise for retailers looking to know their customers in deep, new ways in order to provide carefully targeted products and services. But it is also a source of headaches. Those same retailers are wrestling with a complex new realm of Big Data analytics, where a deluge of information from new sources like video, mobile, and social media threatens to swamp their capacity for processing. That is, if they can properly access those new data streams in the first place.