Today marked an exciting milestone in the continuing convergence of Wireless LAN (Wi-Fi) and cellular technologies as the Wireless Broadband Association (WBA) and the Wi-Fi Alliance (WFA) co-announced that the industry’s first HotSpot 2.0 (HS 2.0) trials are scheduled for later this summer and the HS2.0 certification test beds will be available in mid 2012. HS 2.0 is an industry initiative to develop standards-based interoperable Wi-Fi authentication and handoff. In a nutshell, this enables a seamless handoff between cellular and Wi-Fi networks that allows mobile handset users to roam between the two networks without the need for additional authentication — much as you experience roaming between cellular networks while using your cell phone.
Industry organizations and standards bodies working on the HS 2.0 initiative include the WFA, focused on interoperability; the WBA, the industry group organizing the field trials; and the Global System for Mobile Communications Alliance (GSMA) that ensures the HotSpot 2.0 spec is aligned with the 3GPP framework.
Cisco is a strong supporter of the HS 2.0 initiative and is participating in the upcoming trials with its SP Wi-Fi Carrier Solution. I will continue to provide updates as we move forward with this timely and critical initiative. In the meantime, take a look at this white paper, “The Future of Hotspots: Making Wi-Fi as Secure and Easy to Use as Cellular,” which explains the technology behind HotSpot 2.0.
Tags: authentication, cellular, Cisco Wi-Fi Carrier Solution, Cisco WLAN, GSMA, HotSpot 2.0, HS2.0, seamless roaming, security, WBA, WFA, wi-fi
Numeric passwords are ubiquitous. Most of you use one nearly every day, whether it be on your smartphone, your debit card, your voicemail system, or a secure token. But how secure are those passwords? How likely is an attacker to be able to misuse it?
Read More »
Tags: security, strong passwords
As part of the Manufacturing Impact Series, here’s a reminder not to miss the Context-Aware Solutions for Manufacturing Webinar set for Tuesday 21st June, 2011. It’s essential viewing and listening if you’re a Cisco resale or systems integration partner, or a partner looking to build a Manufacturing Practice and provide solutions to Manufacturing Industry Customer Care-abouts.
This seminar will focus on Context Aware Solutions. Within today’s manufacturing environments, tracking assets and people is crucial for promoting efficiencies in business processes and ultimately reducing costs and time to market. The AeroScout Visibility System accurately locates and tracks valuable assets such as equipment or people. By operating over Cisco® Unified Wireless networks, AeroScout solutions minimize the incremental cost for the communications network and enable greatly enhanced visibility throughout the enterprise. The solution can scale to include tens of thousands of tags, without affecting other traffic on the network.
Click here to register for the Context-Aware Solutions for Manufacturing Webinar
Date: Tuesday 21st June, 2011; Time: 11.00 am — 12.00 pm Eastern Time; (8:00 am Pacific) Place: Online.
Read More »
Tags: aeroscout, Borderless Networks, channels, Cisco, collaboration, customer intimacy, datria, Factory, globalization, Industry, innovation, intermec, librestream, Manufacturing, mining, mobility, operations, partner, plant, productivity, R&D, Research and Development, rfid, security, supply chain, unified communications, video, wip, wireless
At Cisco we understand that the field of IT has grown considerably over the past few years, reaching the point where even professionals in the industry can have a hard time keeping up with everything that is happening in all areas. With groups like Anonymous and LulzSec taking down some pretty big names, it is clear that there is need for greater awareness of security and some of the issues that make security an interesting but ongoing challenge.
Read More »
Tags: security, social engineering
This is part of an ongoing series on the National Strategy for Trusted Identities in Cyberspace. The introduction to this series can be found here.
The National Strategy for Trusted Identities in Cyberspace (NSTIC) proposes a large ecosystem of identity providers, attribute providers, and relying parties that must establish trust with each other in various ways. NSTIC requires various types of trust within the identity ecosystem. These include:
- Users must trust that their Identity Provider will manage their credentials securely and in their best interest.
- Relying Parties must trust in the attributes provided by Attribute Providers.
- Relying Parties must trust Identity Providers to provide the requested strength of authentication and to manage credentials and attributes correctly.
The term “federated identity” is widely used to refer to identity systems that span multiple organizations, each of which maintains its own identity information. That arrangement is typically used between an enterprise and its business partners, such as contract manufacturers, channel partners, and consulting firms. Trust is established individually with each. A fully meshed federation of n participants would require n(n-1) such agreements, which does not scale well beyond small federations, especially considering that these agreements often take the form of contractual negotiation between each party.
Read More »
Tags: identity, NSTIC, NSTIC Series, security