The highly anticipated Wireless Release 8.0 came out last week, and among the feature updates is a key set of enhancements and new modules for Cisco’s CMX solution that come with MSE 8.0. These updates were designed to build out the breadth of location services available to organizations, as well as improve the user experience for customers working with the CMX solution. These enhancements make five great reasons to upgrade to 8.0 today and test out these new tools and features in your Wi-Fi location deployment:
1. Presence Analytics
This new feature enables the use of a single access point (AP) to determine device presence and dwell time. It provides a simplified way to leverage Wi-Fi technology to Detect, Connect, and Engage your customers. Retail stores, hotels, conference facilities, shopping malls, schools, and even city centers can greatly benefit from Presence Analytics. Unleashing this tool can help customers understand the basic, yet powerful, knowledge of the number of visitors to their space, time spent by the visitors, and frequency of visits. It can even provide a more in-depth look into the movement patterns of their visitors, while within their space, giving an understanding of which areas are most attractive to their client base.
Presence Analytics is very simple to configure by naming the entry, selecting the access point, and setting threshold values. Best of all, the majority of CMX Analytics reports are available automatically. All this allows customers to start using CMX Analytics without having to make any changes to their existing network and get immediate value from it.
2. Enhancements to Guest Access
Those familiar with CMX Connect will know that there are two guest access solutions available to customers with Cisco CMX. The first, CMX Connect, provides organizations with a simple, secure way to provide guest Wi-Fi access. CMX Connect offers the option of custom splash pages using a zone-based captive portal.
In MSE 8.0, we have dramatically simplified how CMX Connect is configured. The administrator only needs to indicate information they’d like collected (such as, name and email), and the zones in which the template will be used. Read More »
Tags: 8.0, access point, analytic, analytics, AP, Cisco, client, cmx, Connected, connected mobile experiences, data, deployment, device, engine, enhancement, experience, feature, Guest, guest access, indoor, lbs, location, location based services, location-based, login, mobile, mobility, mse, organization, product, services, solution, technology, venue, wi-fi, wifi, wireless, wlan
Correction: This content has been adjusted to reflect appropriate approvals for use of customer names outside of Cisco.
As technological change occurs at a faster and faster pace, a new language is spreading across the business world. For CIO and line-of-business executives, it’s no longer enough to debate 12- to 18-month programs that incrementally improve the status quo. Instead, executives with an eye to sustainable success are talking “business outcomes.”
At Cisco, we understand this language; we understand that we must focus on helping customers achieve their business priorities quickly, to stay ahead of market transitions and the competition. In Cisco’s Services organization, we demonstrate our stake in our customers’ success by delivering solutions to meet technology trends head on: Read More »
Tags: business outcomes, competition, Professional Services, services
In this week’s lightning episode of Engineers Unplugged, Nisarg Shah and Eric Charlesworth introduce a new product, Cisco Virtual Application Container Services. What does this mean? Watch and see.
If you would like to become Internet Famous, and strut your unicorn talents, join us for our next filming session at VMworld 2014. Tweet me for details!
This is Engineers Unplugged, where technologists talk to each other the way they know best, with a whiteboard. The rules are simple:
- Episodes will publish weekly (or as close to it as we can manage)
- Subscribe to the podcast here: engineersunplugged.com
- Follow the #engineersunplugged conversation on Twitter
- Submit ideas for episodes or volunteer to appear by Tweeting to @CommsNinja
- Practice drawing unicorns
Join the behind the scenes by liking Engineers Unplugged on Facebook.
Tags: cisco virtual application container services, services, ucs director
Do any web search on the inhibitors of moving to cloud and you’ll find a primary challenge rises to the top—business risk. The benefits of cloud often outweigh risks, which is why more and more business information is being shared in the cloud. In fact, 50% of Global 1,000 companies will have customer data stored in the public cloud by 2016 according to Gartner.
The rapid transition of critical data into the cloud and the use of SaaS for business processes mean that organizations need to have a solid approach to manage the business risks of cloud. We have worked closely with customers and Cisco’s own IT department to identify some initial steps that organizations can put in place to mitigate the risks of cloud services with IT governance.
Revise how your company data classification system applies to cloud services.
Businesses typically have already established a tiered classification system including private, confidential, public, etc. This system needs to be revised to detail what and how information should be shared in the cloud. These policies also need to take into account any regulatory or compliance requirements.
Communicate an employee policy specific to cloud service usage.
Recently, I was speaking with a large healthcare provider about what policies they had that outlined what employees could share in the cloud. The customer’s IT group believed that a general company code of conduct safeguarded them. However, as the conversation progressed they realized that their current policies were not explicit as to how this applied to cloud.
Employee policies need to clearly outline what can and cannot be shared with approved corporate cloud vendors. For example, even though a vendor like Salesforce.com or Box.com might be approved, an organization may not want certain confidential information to be shared with an outside vendor. Additionally, these policies also need to address personal use of cloud services (file sharing services, for-free email accounts, etc.). These policies need to be periodically communicated to employees as well as how their actions might be monitored to ensure compliance.
Discover and determine the risk profile of shadow IT.
According to a recent Forrester study, 43 percent of respondents believed shadow IT practices were major threats to their respective organizations. It is critical to discover and classify the services being used that have not been approved by IT. Once identified, there are typically three approaches to handling the risks of shadow IT.
1) Assess and onboard critical cloud applications.
2) Block risky cloud applications with secure web gateways or data loss prevention solutions.
3) Monitor applications and as-a-service usage with alerts for unusual activity.
Establish a data security assessment process for new cloud services.
A vital way to ensure that business data is kept safe is to have a thorough risk assessment process as cloud vendors and services are brought on-board. This process should take into account the following five elements:
- Initiation – Establish what elements of your business a vendor will be involved in and what data will be shared with the vendor. Will they handle confidential/private information or only public data?
- Data encryption and integration – Test the encryption of data as it passes from the organization to the vendor as well as how the data will be stored at the vendor’s data center. Understand how a vendor would integrate with your systems (creating single sign-on, pull corporate data, etc.).
- Vendor data security policies – Can the vendor uphold the policies for protecting your corporate data based on the classification system defined above, and do so the same way or better than your IT department would? Evaluate the vendor’s disaster recovery plan, compliance and regulatory processes, and identity and access controls.
- Vendor stability and proprietary policies – According to Gartner, 1 out of 4 cloud service providers will be out of business in two years. This is largely due to financial instability or acquisitions. Businesses need to ensure that vendors they choose to work with are financially stable. Find out how the vendor would handle your data in the event of a business closure or acquisition. Additionally, do they use a proprietary technology approach that might lock you into using them? Insist that vendors use an open source approach that would help you transition to a new vendor if an SLA was not met or if the vendor was acquired or went out of business.
- Ongoing vendor monitoring – Establish a process to regularly review vendors (annually for those dealing with business critical processes, less regularly for those with less impact).
These are some initial steps to managing the business risks of cloud. However, businesses that are looking to reap the benefits of cloud and avoid risk must put in place a lifecycle approach to manage cloud services.
We recently introduced Cloud Consumption Optimization, an annual subscription service that helps customers govern their cloud adoption from end-to-end and continually monitor cloud use. Learn more about how we can help you govern cloud and manage cloud risks at http://www.cisco.com/go/cloudconsumption
Tags: Cisco Cloud Services, cloud, services
In the last two blogs, I talked about the reasons for IT Transformation, understanding Enterprise Environment and how to effectively set management goals. As more and more companies begin to move towards IT Transformation, there are mistakes that businesses should be weary of. Today I will discuss the pitfalls that can slump the IT transformation process, as well as, the services Cisco has been developing to help Enterprise on the journey to IT transformation. Read More »
Tags: Cisco, Cisco Services, cloud, data center, information technology, IT transformation, network convergence, services, technology