Cisco Blogs


Cisco Blog > Mobility

Johnson City Schools Advance Wireless Network With Cisco BYOD Solutions for K12 Education

Cisco BYOD Solutions for K12 Education bring the freedom to learn anywhere, anytime while adding a dynamic, vivid component to education. Read More »

Tags: , , , , , , ,

Build Customer Loyalty, Boost Store Revenue

Do you want to increase sales by providing shoppers with the information they need when and where they need it – in your store?

Cisco Connected Mobile Experiences solution can help you do just that. Connected Mobile Experiences is a new solution that helps enable retail organizations to use Wi-Fi location services to deliver engaging store experiences and generate valuable shopper insights.

View this 45-minute on-demand video webcast to learn how to captivate your shoppers with new mobile apps supported by Cisco Connected Mobile Experiences. Discover how real-time location intelligence from your wireless network can enhance customer loyalty, improve store operations, and help you:

  • Deliver a personalized in-store shopping experience that increases customer intimacy
  • Provide important information at critical purchase decision points Read More »

Tags: , , , , , , , , , , , , , , , , , , , , , ,

MSE Blog Series Part 4: wIPS

To continue the MSE Blog Series, I’m going to take you on a journey to dig deep into one of the features of Release 7.4, wIPS!

With the increasing popularity of BYOD, wireless security has become an eminent concern for Network Administrators. Cisco Unified Wireless Intrusion Prevention Solution (WIPS) is dedicated to protecting the wireless network security and provide a secure wireless experience to the clients. Cisco, allied with Flukes Networks, to constantly monitor new wireless intrusion techniques, develop new signatures and provide preventive solutions. In 7.4 release, we added the capability of detecting 802.11 frame fuzzing attacks. The new signatures patterns, for detecting such attacks, are available through WIPS profile configuration in NCS. These signature patterns are enabled by default and provide the full level of security. The user, however, could tune them to get the desired protection level.

wips 1

Read More »

Tags: , , , , , , , , , , , , , , , , , ,

Looking Beyond the Mobile Phone

Why the Network Will Drive the Next Wave of Mobility

Forty years ago, the first phone call was placed on a handheld mobile phone. The call was placed by Martin Cooper at Motorola’s Communications Systems Division, who phoned a competitor at Bell Labs—and launched a new era. The brick-like prototype he used weighed two pounds and cost nearly $4,000.

Reflecting on the first mobile phone call also gives us a great opportunity to think about where mobile communication will take us in the years to come. In a few short decades, cell phones have evolved from a clunky appliance used mainly by high-powered businesspeople, into a key part of everyday life. Read More »

Tags: , , , , ,

Network Threats Are Hitching a Ride in Mobile Environments [Crosspost]

Protecting Your Business in an “Any to Any” World

Innovation never stops in the mobile world, and that rule applies to security threats as well. Network attacks are becoming more sophisticated and even high-tech businesses with the most advanced security may find themselves in the crosshairs as we shift to more devices and anywhere access.

Just a few weeks ago, multiple leading social networking and large enterprises were hit with an attack when their employees visited a known and trusted website focused on mobile application development. Read More »

Tags: , , , , , , ,