Cisco Blogs


Cisco Blog > Security

Wireless Security Yesterday, Today and Tomorrow

Ten years ago, I remember driving around my neighborhood with a laptop, wireless card, and an antenna looking at the Service Set Identifiers (SSID) of all the open wireless networks. Back then, a home user’s packets often flew through the air unencrypted with nary a thought to who might be listening.

 

Cisco-wifi-components_small1

As a protocol, Wireless Fidelity (WiFi), has continually improved (IEEE 802.11) and today it is the preferred communication channel for a multitude of home devices including video game consoles, cameras, streaming video devices, mobile phones, tablets, and list goes on. As October is National Cyber Security Awareness Month, we outline typical WiFi risks and share sensible precautions.

Family-on-laptop-300x199In my last three homes, the Internet Service Provider (ISP) installation technician arrived with a cable modem that included four Ethernet ports and native WiFi default enabled. In each case, the technician explained that I could manage the cable modem through the settings webpage. When I inquired about management authentication credentials all of the technicians told me that passwords were not enabled by default, which naturally caused some consternation due to the obvious security implications.

It turns out that most ISPs will provide a modem without WiFi capabilities upon request. You can also request that a WiFi enabled modem be converted to bridge mode which will allow you to attach and manage your own WiFi access point (AP) without worrying about conflicts. Read More »

Tags: , , , , , ,

Strength in Numbers: Meet the CMX Partner Ecosystem

Since the launch of Connected Mobile Experiences (CMX), we have seen tremendous interest from our customers to monetize their investment in Wi-Fi Solutions and enable new line-of-business applications to gain insights, deliver efficiencies and engage end-users.  This week Cisco is announcing a collection of technology developer partnerships, as managed through the Cisco Developer Network (CDN), that help us bring a “whole offering” to our Customers with the addition of domain expertise, geographical focus and technology feature infusion that gives our Customers confidence, security and operational excellence to move forward in this nascent market.

The foundation of this technical integration begins with the connection to the Cisco WLAN & Unified Access Architecture through the Mobility Services API, which exposes context-aware information gathered by the Cisco Mobility Services Engine (MSE) for the integration with following disciplines: Read More »

Tags: , , , , , , , , , , , , ,

Leveraging Location: Cisco Sets the Curve with Facebook and Other Partners

Have you heard? Many organizations are now realizing that they can leverage location-based services to provide personalized mobile experiences and customer analytics. It pays to stay connected to your consumers and enhancing the mobile experience. Today at Interop New York, we unveiled a number of new product and solution innovations built to expand on and extend the power of Cisco Unified Access to drive these new connected mobile experiences.

Nearly one year into announcing our Connected Mobile Experiences (CMX) solution, and with today’s announcement, there’s even more. We’re kicking off a deep dive blog series to give you an in depth look at the new enhancements, but for now here’s a taste of what’s new:

CMX for Facebook Wi-Fi 

CMX for Facebook Wi-Fi allows retailers, hoteliers, restaurants, and more to engage and analyze customers and guests using the Cisco and Facebook Wi-Fi platforms. It enables guests to easily connect to the Wi-Fi network using their Facebook credentials and “check-in” to the venue’s Facebook profile. The check ins give venues additional marketing and branding opportunities through broadcasting through guest news feeds, as well as valuable demographic information. See how a conference center, Evergreen Brickworks, is using the solution:

CMX Analytics

Enhanced onsite analytics have a revamped UI to show you how, where, and when customers and visitors are moving throughout a venue. Read More »

Tags: , , , , , , , , , , , ,

The Sixth Step to Enterprise Mobility: Power to Your People

This is the sixth post in a blog series featuring Vine-format videos focusing on the “Six Essential Steps for Unleashing the Power of Enterprise Mobility”. The first blog post discussing how to build a mobile structure can be found here. The second blog post highlighting the benefits going virtual can be found here. The third blog post focused on preparing enterprises for the division of devices can be found here. The fourth blog post focused on creating an app checkpoint can be found here. The fifth blog post focused on defending data can be found here.

step6a

Watch video at http://youtu.be/3kD5EpXypFc

Over the course of this series, we’ve discussed how enterprises can better enable people to work in their own way, regardless of where they are and what device they are using. We started by making smart plans at an architecture level and then implementing secure policies along the way. The final step enterprises need to take may be the hardest one of all but can yield the greatest results. To increase productivity, business agility, and customer satisfaction, enterprises must actively embrace mobility in the workplace. Here’s a short checklist to help organizations with this last step:

1. Go Beyond Provisioning Mobility for Sales: Think “All-Company” Mobility.

The definition of mobility is expanding to include not just “road warriors” but also “corridor warriors,” as well as guest and home workers.

Make sure your mobility architecture is designed to accommodate them all. Then create a phased implementation plan. Determine which users and business processes you want to prioritize first and move forward at a pace that makes sense for your enterprise.

An all-hands-on-deck approach will also help drive future implementation of mobile solutions. Read More »

Tags: , , , , , , , , , , ,

The Fifth Step to Enterprise Mobility: Defending Your Data

This is the fifth post in a blog series featuring Vine-format videos focusing on the “Six Essential Steps for Unleashing the Power of Enterprise Mobility”. The first blog post discussing how to build a mobile structure can be found here. The second blog post highlighting the benefits going virtual can be found here. The third blog post focused on preparing enterprises for the division of devices can be found here. The fourth blog post focused on creating an app checkpoint can be found here

In a 2012 survey of IT executives and CEOs, nearly half of the companies that permit mobility and BYOD reported experiencing a data or security breach as a result of an employee-owned device accessing the corporate network. In addition, security concerns continue to remain a key issue for decision makers looking to deploy additional mobile solutions such as enterprise mobile apps, according to a recent article from IT Pro.

Careful planning can help enterprises manage security concerns and harness the power of mobility. Here’s a brief checklist to help organizations secure devices, data and the network:

Watch the video: http://youtu.be/k8ytncvjE7M

Watch the video: http://youtu.be/k8ytncvjE7M

1. IT Pushing of Capability Down to End Devices

 IT needs to be able to push capabilities down to end devices and access control for both on-premises and off-premises apps, while providing pull capabilities for users, so they can self-provision apps.

IT must have the ability to apply situational control policies (for example, for disabling cameras on mobile devices in order to protect on-premises company assets when employees and guests are on corporate premises or in restricted areas). Another must have? The ability to remotely locate, lock, and wipe devices should there be a theft or if an employee leaves the company. It is also essential to be able to automate geo-specific policies to control roaming costs when workers are out of country. Read More »

Tags: , , , , , , , , , , ,